'Companies spend millions of dollars on firewalls, encryption and secure access devices and it's money wasted; none of these measures address the weakest link in the security chain.'
Adversarial Security Risk Review
Maturity Assessment, Audit & Benchmarking – Are you as secure as you think you are?
Strengthening Human Factors
Building Risk Awareness & developing your Security Culture, Executive and Staff training, Education services and learning tools.
Provision of Expertise and Resources
Reviewing and defining Strategy, Policy, Process’s, Procedures. Change & Transformation, Skilled Cyber and Security leadership and interim project and programme staff.
Solutions & Platforms Architectures and Delivery
Optimisation of in-house technologies and security tools and platforms. Tech refresh and gap filling. Partner solutions and Systems Integration.
Federated Managed Security Services
Linking in-house capability to out-sourced managed services and threat management capabilities. Threat Intelligence and sharing. Threat Mitigation and resolution.
At the heart of almost all of the high profile hacks we hear about, lies an element of hacking the HUMAN. Very commonly such vulnerabilities are exploitable because we humans do indeed share traits that include varying degrees of:
Negligence Carelessness Ignorance Laziness Stupidity
So the would be hacker may use social engineering to gain valuable information or to get an unsuspecting victim to click on a compromised link. They may tailgate the unsuspecting (careless?) employee through an organisations best attempts at physical security.
A motivated and professional hacker will take advantage of which ever option presents itself or if the prize is attractive enough use a fusion of all techniques to achieve the desired result.
Human factors play a central role in how strong (or weak) your company's information security defences are.