CyberSecurity S.r.l.

IT SECURITY

THE CODE WORD IS CYBER-RESILIENCE

SECURITY

The currently known cyber threats are considered a source of risk not to be overlooked - among the most frequent to date are identity theft, tampering with sensitive data or critical services blocking. What is more, this landscape is constantly evolving at an unprecedented rate. As the market requires increasingly advanced and evolved solutions, we are required to respond to it by paying attention to future scenarios as well.

Our framework allows you to use techniques to test the security of a system or a network of computers by evaluating and methodically verifying the effectiveness of application security checks, in line with the Open Web Application Security Project (OWASP) directives.

In particular, we offer the following services:

  • External/Internal Vulnerability Assessment
  • External/Internal Penetration Testing
  • Social Engineering Testing
  • WiFi Testing

Given the extremely dynamic nature of the cyber threat landscape, it is natural for our team to constantly use state-of-the-art security technologies, by continually expanding the range of technical capabilities available and consequently updating its operational capabilities.

Vulnerability Assessment

Vulnerability Assessment is one of the phases of penetration testing in which known vulnerabilities are discovered within a system or web application while providing possible solutions to them.

Penetration Testing

A Penetration Testing is a simulation of a malicious attack on a computer system, a network or an organization in real conditions. It allows to determine the resilience of the computer system with respect to real attacks. This type of test provides a complete view of the system so that we can recommend the best solutions to protect it.

Social Engineering Testing

Social Engineering defines a series of techniques aimed at persuading people to provide personal information such as passwords or bank details or to allow access to a computer in order to secretly install malicious software. In this activity, different types of attacks directed to your company’s members are simulated using external entities such as social networks and emails to test the employees' ability to deal with attacks that can also occur outside the workplace.

WiFi Testing

Wireless communications are an invisible and omnipresent service that allows data to flow in and out of companies and homes via mobile devices and wireless infrastructure. Almost all modern organizations have at least a minimum level of WiFi wireless networks available. While implementing this activity, we will try to violate the access to the wifi network in order to understand if your system is vulnerable to these types of attacks.