Services
Penetration tests
Challenges The focus on effective delivery of business services sets a rapid pace for modern companies’ operations. The multitude and variety of ICT systems as well as the lack of appropriate procedures for inventory and configuration management can lead to a failure to update systems, uncontrolled connections being established between unknown devices and the infrastructure or the occurrence of vulnerabilities in systems. These types of violations could lead to an increased exposure to difficult to detect cyberattacks, the aftermath of which may affect the company’s image and budget.
MoreNIS Directive Audit
Challenges The NIS directive (in Poland implemented as “Ustawa o Krajowym Systemie Cyberbezpieczeństwa) obliges key service operators and digital service providers to demonstrate appropriate cybersecurity capabilities, in order to ensure the continuity of digital services as well as confidentiality, integrity and availability of data processed in systems supporting the key services. how can we help you? Depending on a company’s specific needs, we offer: a detailed audit of information system security including penetration tests, security code review and compliance with the Cybersecurity Bill of Materials,
MoreNetwork Segmentation
Challenges ICS and critical infrastructure are becoming the targets of cyberattacks. The variety of producers, solutions, and often undocumented modernizations of network infrastructure, as well as the provision of Internet devices pose a threat to the security and continuity of production or availability of services. Industrial networks should be designed and modernized in a way that considers cybersecurity. In accordance with the principle of the least permissions and transferring only necessary information, industrial automation systems should ensure the movement of only the necessary packets in areas where controllers, visualization systems, and actuators are located.
MoreMobile Device Security
Challenges With the development of mobile technologies, the security of smartphones has become as important as the security of servers or personal computers. Modern phones are devices used not only for telephone communication, but also for navigation, Internet browsing, or electronic payments. Their widespread use, also for business purposes, results in the need to verify their security against unauthorised access. 3,5 MM malicious mobile applications identified in 2019 130 K cases of the installation of stalkerware (programs designed to spy on private individuals) 43 countries in which the government-created malware Pegasus was detected How can we help?
MoreIndustrial Control Systems Security Audit
Challenges Equipment manufacturers and integrators might not provide adequate cybersecurity measures at the stage of implementation and maintenance of control systems. More and more frequent attacks on industrial infrastructure indicate the need to include cybersecurity aspects in key risk analysis. How can we help you? We offer assessments of individual risk areas at the technical, process and business levels. We identify high-risk areas. We present recommendations of corrective actions increasing ICS cybersecurity, adjusted to the needs and capabilities of the company.
MoreCybersecurity Bill of Materials
Challenges In today’s world, where malware, ransomware, botnets appear overnight and during the week are able to paralyze the work of hospitals, offices and factories around the world: the question is how much we are able to trust software and hardware manufacturers in terms of their security solutions? As practice shows, most attacks are carried out using vulnerabilities in open source components that are not updated frequently, and using vulnerabilities in the ICT device firmware, IoT and OT.
MoreCritical Infrastructure Protection
Challenges The loss of control over infrastructure assets can lead to severe consequences. The sources of threats are not only natural disasters but also cyber attacks by terrorist groups and state organisations. The introduction of TCP/IP protocols and the penetration of IT and OT networks, even in critical infrastructure systems pose a threat to security and the availability of services. Adversaries may use known or unknown vulnerabilities to take control of protection devices, IEDs, PLCs, RTUs, and SCADA systems.
MoreCloud Services Security
Challenges Many companies using cloud computing services are not aware that their cloud resources can be accessed by anyone from the comfort of their preferred search engines. The default configuration in most cases does not fully meet the business’s needs and may not provide an adequate level of security. How can we help? We offer a detailed analysis of cloud services configuration, including: identity management systems, virtual network settings, event monitoring and logging, privileged account controls, access control services: firewall, permissions and roles, NAT settings, load balancer We will recommend corrective actions to increase the level of security as part of the service.
MoreAWS Level 1 MSSP
Challenges Constantly maintaining adequate level of security of cloud solutions often becomes taxing on both time, and resources. Is growth of your solution impeded by security operations overhead? Or maybe your environment is scaling outside your capabilities? Do you need expertise in niche cloud security area that require difficult to obtain experience? Share responsibility for security of your AWS environment with specialists that will allow you to focus on your business, not it’s maintenance.
MoreAMI System Security
Challenges In the last couple of years, energy providers have been expanding their infrastructure, whether by replacing previously used meters with Smart Meters or integrating newer models equipped with integrated remote metering systems. The EU 2009/72/WE Directive enforces a requirement for at least 80 percent of energy receivers to be supplied with smart meters by 2026, creating several new responsibilities for energy distributors, namely subjects such as meter and router management, ensuring sufficient communication standards, storage of passwords and DLMS authentication keys as well as software updates.
More