Cybersecurity is a persistent and increasing business risk for organizations that depend on mobile endpoints that connect through networked and cloud-enabled platforms.
With solutions tailored to your specific needs, BlackBerry’s cybersecurity consulting and tools will help you:
Penetration testing is the process of attempting to gain access to computer systems, networks, mobile devices, wireless communications and web applications, without knowledge of usernames, passwords or any other normal means of access. With permission from your organization to test, the ultimate goal is to find vulnerabilities that a hacker could exploit and tell you how to remove the vulnerability.
Standard types of testing available include:
External penetration testing to ensure that your Company’s IT systems are secure from any internet based attack.
Internal penetration testing to reveal any potential issues that may allow a server to be compromised by a user already on the internal network, including internal employees.
PCI DSS ASV Scanning to scan infrastructure related to card payments.
Social Engineering to identify environment and human vulnerabilities that can threaten your networks.
THINK (Threat Intelligence and Knowledge) service provides a unique and ‘real world’ approach to assessing the security of your organization. Cyber threats can come from any of a number of sources, but all have one advantage in common: time. To better simulate this reality, unlike a standard penetration test, a THINK test will typically occur over a period of time. This allows the testers to observe the targets and choose the most effective time for an attack, or attempt multiple low scale assaults to gain an understanding of the nature of protections in place.
Are you a supplier to the Ministry of Defense or its Supply Chain?
From January 2016 the MoD will stipulate in all new contracts for MoD identifiable products and services that Cyber Essentials or Cyber Essentials PLUS is a requirement upon commencement of the contract.
Encription Limited is an authorized certification body under the QG Cyber Essentials accreditation scheme.
Unlock the potential of digital evidence. Today, crime often involves use of digital devices either directly or indirectly. A forensic examination of these devices can reveal important information that could strengthen a case.
Choose from a range of forensic services including:
Digital forensic investigations on hard drives, removable media, digital cameras and smartphones.
Incident response support to advise on the correct steps to follow in order to ensure evidence is collected and the incident is contained.
One-day onsite forensic readiness consultation to help you develop an incident response plan.
Damaged drive recovery can help you avoid losing business critical data contained on hard disks.
Learn how to protect your organization from potential threats with a wide range of professional IT security and forensics training courses. These courses are delivered either on-site or in-house by active penetration testers.
Have a look at some of the tools and resources available, or get in touch with us to inquire further about the services available.