IT security only works,
if the technology is safe and the people are sensitized.
Modern attacks exploit human vulnerabilities in combination with technical security vulnerabilities.
Take a holistic view of the IT security level in your company. On a human and technical level.
& Awareness Shows
Experience live how criminals act and proceed on the net. During a live hacking we take our audience on an exciting journey of modern criminality.
All lectures are about presenting the state of IT security and highlighting social problems. Because only those who know how criminals proceed can protect themselves against attacks, security gaps and fraud. This should not be a deterrent to digitalisation. Participants are given the opportunity to protect themselves and others.
& Social Engineering Audits
Most attackers gain access to the company via phishing mail. It is not the bad phishing mails that pose a threat to the company.
It’s the perfected mails that the victims don’t even notice have fallen for a phishing mail. To protect your company from the most popular gateway, to train and educate your employees, we run simulated phishing campaigns at different detection levels.
for mobile & Web Applications
A penetration test is designed to detect technical vulnerabilities in one or more specific applications.
Following detection and risk assessment, the hazard should be minimised or, at best, closed. We examine mobile & Web Applications for security gaps, document these and prepare individual recommendations for action. We then present the report. This test is usually carried out on a test system.
on critical business processes
Red Teaming has a broader scope than penetration testing. Above all, the security of critical business processes is in the foreground.
Exploits and social engineering attacks are used to simulate a realistic view of the attackers. The development of PoCs is mandatory at Red Teaming. The closing of potential security risks and dangers is in the foreground. Red Teaming usually takes place on a live system.
Cutting Edge Technologies
Beyond the state of the art tools and approaches, we always go new approaches and manage to reduce the distance to new criminals mesh and security gaps.
Synergies in the team
A team is more than the sum of its members – we are firmly convinced of this and combine all business areas with each other, creating multiple synergy effects.
The nesting of security gaps, the recognition of unusual patterns and the trial and error of unusual methods – in short: creative work in computer science. Our philosophy.
+49 (0) 209 – 9596 – 766
+49 (0) 209 – 9596 – 766
Our latest blog posts