Cyber and Information Security Tactics, Techniques, Mitigations based on MITRE | ATT&CK Matrix, NIST, CISA

Defensive Security

  • Incident Response – The overarching process that an organization will follow in order to prepare for, detect, contain, and recover from a data breach
  • Code analysis, deobfuscation
  • Code, credentials leak searching and deletion (for example from GitHub)
  • Digital Forensics – A subset of forensic science that examines system data, user activity, and other pieces of digital evidence to determine if an attack is in progress and who may be behind the activity
  • Data collection for Litigation Hold process
  • Websites securing
  • Network securing
  • URL and domain control – searching for similar domains and blocking if not legitimate
  • Potentially dangerous websites analysis and blocking
  • Network traffic investigations
  • Patching

Offensive Security, Treat Hunting and OSINT

  • Threat hunting – is the practice of proactively searching for cyber threats that are lurking undetected in a network
  • Penetration Testing and Vulnerability Scanning
  • Reconnaissance, discovery and OSINT (Open Source INTelligence) – searching information on internet (standard, deep web, dark web)

Awareness Security Support and Fulfilment

  • Awareness consultations, user training
  • Phishing simulations
  • Data Leak Prevention (DLP) and investigation – logs analysis, consultations
  • Phishing prevention and investigation – logs analysis, consultations
  • SSL Certificates management
  • Data encryption
  • Password Policies and Multi-factor Authentication

Environments, Data Sources (security related):

  • Security tools
  • Microsoft tools (Microsoft Azure, Microsoft Purview, Microsoft 365 Security Center, Microsoft 365 Defender, Microsoft 365 admin center, Microsoft Endpoint Manager admin center, Office 365 Security & Compliance, Microsoft SharePoint, Microsoft Teams)
  • Amazon AWS
  • Google GSuite
  • Cloudflare

Remote IT ServiceDesk

  • Problem solving
  • Maintenance
  • Installations
  • Configurations
  • Data recovery
  • Data wiping (destroying)
  • Active Directory Users and Computers management
  • AD building from scratch, Building GPO policies
  • Windows systems – 7, 8, 10, Servers administration
  • Linux administration
  • MacOS administration
  • Mobile OS – Android & iOS Web administration

Trusted Partners

In order to bring to our clients the best services we have partnered with renowned brands and then following logos, Dell, Microsoft, Lenovo, Nutanix, Furuno, SpeedCast, Sonicwall and VmWare.

Request Your Free Consultation

Please provide your first name
Please provide your last name
Please provide your phone number
Please provide your subject
Please provide your question
Thank you for your message. It has been sent.
There was an error trying to send your message. Please try again later.