Testing Services

External Network Devices
Identifies network device vulnerabilities of your corporate network from the outside-in such as: VPN and Firewalls. Provide solutions to minimize the threat of the discovered vulnerabilities.

Internal Network Devices
Identifies network device vulnerabilities of your corporate network from the inside-out such as: Workstations, Laptops, Servers, Printers and Phone lines. Provide solutions to minimize the threat of the discovered vulnerabilities

Web Applications
Identifies the OWASP top 10 vulnerabilities of a web application with manual verification. Our team provides solutions on how to reduce the level of threats discovered in the web application.

SCADA Vulnerability Scanning
Our team of experts assess your Industrial Control System (ICS) to for the necessary level of security needed. A majority of the legacy ICS systems were not designed to be connected to the internet.

Re-scan
Once the initial assessment is concluded and your team has received the remediation steps, our team is available to reassess the same environment to determine if the vulnerabilities have been resolved.

WIFI
This test identifies the level of broadcasting your wireless network is projecting, identifies any rogue access points and we assess the level of encryption your wireless network is utilizing through a strategy of unauthorized access attempts.

Red & Blue Team Attack
Red team versus blue team exercises simulate real-life cyberattacks against organizations to locate weaknesses and improve information security.

Re-test
It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout.

Social Engineering
The art of manipulating and deceiving an employee to gain access to confidential corporate data.
Email Phishing Campaign
Phone Pretexting
Physical Security, Impersonation
Compliance & Consulting

Security Awareness Training
Educating an organizations employees, executives and board of directors on different areas of security risk and compliance.

Policy Procedures Review
Process of reviewing the current policies and procedures set forth by an organization to determine areas of strength, flaws and improvement.

Policies and Procedures Creation
Process of evaluating your current business processes, determining what is necessary for your organization and creating applicable policies and procedures.

HIPPA Risk and Security Assessment
Gain an overview of your organizations current HIPPA environment and conduct a risk and security assessment to determine which areas are in risk of compliance failure and determine any possible security vulnerabilities.

PCI Gap Assessment
This assessment is conducted to evaluate the current state from your organizations previous PCI audit and determine what progressions or regressions your PCI-DSS environment underwent.

PCI Readiness Assessment
We evaluate your current PCI-DSS environment and determine your organizations current readiness to pass the upcoming audit.

CIP Compliance Assessment
Evaluate the current CIP environment to determine areas of strength and areas which require improvement.

Risk Assessment
A risk assessment is to determine the overall external risk your digital environment currently faces while conducting your everyday business.

Business Continuity Planning
Our team evaluates your current BCP plan in reference to your organization, provides recommendations to ensure your business can continue to function with minimal downtime.

Risk Management Frame Work and Development
This assessment evaluates your current risk management plan and recommendation to improve and develop a more strengthened plan tailored to your environment.

Vendor Management
Vendor management is a critical sector within your organization to ensure third parties are complying with your business policies and procedures to minimize any possible risk.

Staff Augmentation
Cyber Threat Security will conduct a search for all candidates, evaluate the necessities your organization requires to fill a certain position. Our team will research, thoroughly interview and evaluate the best candidates for your organization’s needs.

Remediation Time Blocks
In the event your organization has discovered vulnerabilities or requires assistance to improve your security infrastructure for compliance, our team is readily available for remediation assistance.