The internet is continuously "scanned" and the results of this can often be found in public sources. During this research, we will dig into this in order to map out the "exposure" of your organization from a security perspective.
We use the OSINT-Framework. We will search the internet for information related to your organization, about systems, people, documents, backups, passwords, archives and so on.
Our investigations into external enterprise networks go through these phases:
Conversation
We start with a discussion about the collaboration and test approach.
Examination
We look for sensitive information related to your organization in various public sources.
Documentation
We document our findings and personalized advice in a comprehensive test report.
Handover
We hand over the report, discuss the main points with you and think along about pragmatic solutions.
Next steps
We will discuss possible follow-up steps with you. We also recommend an "Internal Investigation".
Aftercare
We remain available to you for questions, retests and advice.
Do you want permanent assurance about the secure setup of your servers or sites? Contact us now for a non-committal introductory meeting.