Defensive security services

Incident Response

 

Incident Response
When, despite our best efforts, an incident occurs, we want to be sure that we have a plan to identify how an attack occurred, what data was affected, who did it and how to prevent it from happening in the future. To this end our incident response teams are available 24-7-365 to respond to an incident. We can utilize our experience in offensive security to better understand the kill chain and understand what happened while our reputable forensic investigators have significant experience in collecting evidence preparing case dockets and acting as expert witnesses.

SOC/SEIM

 

SOC/SEIM
The more mature an attacker is, the less likely you are to identify their attacks. This leads to many documented examples where attackers have been exfiltrating data from an organisations for months before the attack is uncovered. Investing in a “best in breed” security operations center allows our clients to more quickly and accurately identify attackers.

Foresnsic Network Testing

 

Foresnsic Network Testing
As a leader in Mobile Forensics, Checkmark Cyber and digital experts specialise in the forensic retrieval of data from cell phones and other mobile devices in a manner that preserves the evidence under forensically sound conditions and present it with the integrity of the data intact. This is to ensure that it is court-admissible. Additionally, we are able to perform advanced analyses such as chip-off forensic extractions, spyware detection to determine if surveillance software is installed on a device, operating system and application artefact recovery (Internet history, emails, tweets, etc.), and localization services to determine where a phone has beensecurity. These tests mimic sophisticated attackers focused specifically on your organisation. These tests usually provide no scope or limitations and sometimes include simulating the TTP of known threat actors.

Digital Forensics
  Digital Forensics Often, after an incident or suspected criminal act large amounts of data can be very confusing to gather, understand or contextualize. During a digital forensic examination, we use forensically sound techniques and world class software to image IT infra-structure and analyze big data. This allows us to identify the people involved including relationships, lifestyle assessments and ultimately using our eDiscovery platform to provide litigation support while we maintain chains of custody.
Awareness Training

 

Awareness Training

Our staff are our greatest assets and yet they can also be our greatest risks. Hacker are turning more and more to social engineering in order to breach a companies IT . Training your staff to be cyber aware is key to any cyber resilience network. It makes sense to train staff as up to 91% of all cyber attacks have an element of scial engineering in them