CyberSOC Inc.

Your business under our protection

Security is always seen as too much until the day it is not enough.

William H. Webster
Former FBI Director

Cybersecurity is a critical, but often misunderstood, aspect of companies’ technology infrastructures and should be a priority, no matter the size of your business.

Only a small percentage of cyber attacks are considered targeted attacks. The majority of cyber criminals are indiscriminate;

they target vulnerable computer systems regardless of whether the systems are part of a Fortune 500 or small businesses.

Key types of cybersecurity threats affecting small & medium size businesses

Data theft / identity theft Ransomware
Watering hole attack
Data loss
Ransomware
Insider threat
Distributed denial of service
Phishing
Malware
Whaling
Data theft / identity theft
Watering hole attack
Data loss
Ransomware
Insider threat
Distributed denial of service
Phishing
Malware
Whaling

Conducting reviews & tests regularly will help your organization understand your compliance levels & address potential risks early. We at CyberSOC help YOU to stay protected & avoid costly mistakes.

Our Services

Penetration Testing (Pentest)

  • Mostly manual security testing process against networks / applications / organizations
  • Based on OWASP and NIST SP standards & guidance
  • Performed by Black, Gray & White Box models
  • Resources tested: web and desktop applications, API services, mobile applications, networks (including WiFi), ActiveDirectory, Clouds
  • Compliance requirements (SOC 2, SOX, ISO 27001, NIST 800-53, PCI-DSS, HIPAA, GDPR,CCPA)

Red Team

  • Same as Pentest, but used with specific scenarios. Continuous process
  • Can be applied both outside and inside of the company’s infrastructure / environment
  • Not required for mot compliances / standards
  • Best way to check your SOC / Security Team

Vulnerability Assessment

  • Vulnerability assessment is less sophisticated and more affordable service, including mainly vulnerability scanning & manual results validation
  • Used against internal networks / environments and required by compliances (ISO, GDPR, HIPAA, PCI DSS, SOC)

Vulnerability Scanning

  • Vulnerability scanning (vuln scan) is an automated process required for vulnerability management or basic understanding of actual security level. One-time or continuous process
  • Required by compliances (ISO, GDP9, HIPAA, PCI DSS, SOC)

Additional Services

Social Engineering + OSINT (phishing, whaling, vishing)

  • Social engineering — best way to check employees security awareness. Usually goes together with Pentests and / or Red Team attacks
  • OSINT (Open Source Intelligence) — helps to identify possible sensitive data leaks, passwords, etc. Usually used together with social engineering activities or against the client s supply chain

Defensive Practice

  • Internal Infrastructure Security Review
  • Monitoring and Vulnerability Scanning
  • implementation (including SIEM solutions)
  • Documentation / consultancy
  • Pre-audit / Gap analysis (Assistance with audit preparation including gap analysis and roadmap)
  • Assistance during the audit (consultancy, participation on calls with auditors)

Assistance during the audit

  • Participation on calls with auditors
  • Remediation process assistance
  • Scoping