Our Services /  IT Security Solutions

Your Team of Security Experts

Cyber Security Advisors

Security is constantly evolving and should be top of mind for organizations. Our team of security experts including Certified Ethical Hackers and CISSPs are here for you. Cyber Advisors security solutions are straight to the point and enable your business to be more secure, protect your reputation and build awareness. They use multiple layers of security from only the top partners vetted by our security engineers within our labs.


Competitive Advantages

  • Cyber Advisors is SOC 2 certified
  • Cyber Advisors is recognized as a CRN Top 100 Security Provider
  • Not only are we your security partner, Cyber Advisors goes beyond and are experts in total cloud infrastructure
  • We believe in the human side of IT – Our team builds personal relationships, knows your business and is here for you
  • Strategic security and technology roadmaps help to align your business and IT objectives

SECURITY DISCIPLINES

Click to Learn More

  • External Reconnaissance
    • The starting point for almost any threat actor is intelligence gathering. With knowledge of a target’s locations, services, addressing and structure, the threat actor can design attacks against a single object or an entire service. The tools used for these assessments are occasionally commercial but are most often open source. This is why these engagements are usually referred to as OSINT (open source intelligence).
  • External Vulnerability & Penetration Testing
    • Identifying any vulnerabilities that may be exposed on the external (Internet-facing) part of the network is the next logical step in an assessment. These tests are completed using an uncredentialed scan, meaning that the activity emulates an attacker with no internal knowledge to the environment and the vulnerabilities they could exploit. Once the vulnerability scan is completed, an attempt is made to exploit the edge network. Some clients request only a vulnerability scan to be performed.
  • Internal Vulnerability & Penetration Testing
    • This process is again completed using an uncredentialed scan, but the work is performed from the inside using a special piece of hardware that we ship or deliver to the client location. Some clients request only a vulnerability scan to be performed.
  • Physical Security Assessment
    • It has been said that “physical access is king” because if an attacker can breach the infrastructure physically, then they can likely breach any device they wish. In this assessment, the environment is reviewed against the “Five D’s” of physical security controls: Deter, Detect, Delay, Deny and Defend (used in that order). The assessor is specifically looking to determine which controls are applied and the potential for risk in the physical environment.
  • Web Application Penetration Testing
    • This assessment takes a web application (usually in the form of an URL) and performs specialized penetration exercises against the site to determine weaknesses. Special tools (commercial and open source) are used for the testing. We do not yet perform white-box (code review) assessments as that requires programming capabilities in-house.
  • Wireless Security Assessment
    • While basic wireless identification and bleed (the distance the signal can travel outside the building) is usually covered in a physical assessment, a wireless assessment takes a step further by attempting to breach the network through wireless access. Special hardware and software is used for this assessment.
  • Assumed Breach Assessment
    • External and internal vulnerability assessments can show weaknesses of the outside “shell” and inside “center”, but they do not truly reflect what would be accessible to a threat actor that obtains direct workstation access. In this assessment, we access a user system as a general user that has been assumed to be breached and collect data about the environment using “living off the land” tools that are built into the operating system. This assessment is often used to evaluate the capabilities of anti-virus, Endpoint Detection and Response (EDR) applications, availability of PII/PHI to general users and SOC response behavior.
  • Firewall Assessment
    • This assessment is a review of the core and/or secondary firewalls in the environment. The security engineer assigned to the review is looking for configuration issues, missed best practices, open rules, etc. This data is then processed and reported with remediation recommendations. The quantity of firewalls affect the cost.
  • Active Directory Assessment
    • An Active Directory (AD) assessment is performed by using tools that export information about the AD structure, security, and health. This information is processed by internal resources well-versed in Microsoft technologies and a report is generated with remediation recommendations.
  • Social Engineering Assessment (Phishing)
    • In this assessment, we are reviewing the security awareness of the client base in the use of email. This is performed either with a one-off phishing toolset or a subscription can be purchased to allow for repeat engagements (i.e. phishing campaigns) by the client’s IT department.
  • Social Engineering Assessment (Pretexting)
    • Pretexting is another way of saying “pretending”. One of the most effective ways to defeat the technical defenses of a highly protected environment is to breach physical security. One of the best ways to breach physical security is through pretending to be an employee or trusted vendor. This assessment is where we might call users as the “IT department”, show up dressed as a vendor or simply test the ability to just “walk in” by tailgating.
  • Incident Response Tabletop Exercise
    • This exercise is intended to evaluate a client’s ability to handle an incident by providing specific scenarios and testing their ability to respond. This is usually for more security-mature clients as it requires previously-defined incident response policies and playbooks.
  • Digital Forensics & Incident Response (DFIR)
    • Our security team is available to handle both Incident Response (IR) and Root Cause Analysis (additional cost/service). Root Cause Analysis (RCA) is requested when you want to determine the exact or likely path an attacker has used to compromise a system(s) and the extent of compromise.
  • Security Control Review
    • This assessment maps a client’s security controls to a framework, usually NIST Cybersecurity Framework (NIST CSF). This provides the client with a clear picture of which security controls they have in place and what still needs to be addressed. If the engagement includes it, we can provide starter templates for key policies wherever needed.

Virtual CISO (vCISO)

Security Expertise & Guidance for Your Organization

The Cyber Advisors Virtual CISO (vCISO) service is designed to improve your security posture and build your information security program. Most organizations do not have the budget or resources to hire a full-time CISO, but the need for understanding risk and seeking guidance and vision is a priority. Our team arms your organization with top-level security experts who will confidently assist your organization in navigating the security landscape.

STRATEGY & VISION

The Cyber Advisors vCISO is a high-level security expert who helps your organization set the strategy and vision around information security. The vCISO knows your business and is your trusted advisor and partner.

PROACTIVE EXPERTS

Threats are constantly evolving in the security landscape and we are here to protect your data, your team and your organization. The vCISO brings their knowledge and expertise to proactively manage risk, improve your security posture and build your information security program.

CUSTOMIZED

The Cyber Advisors vCISO works with your team to review business threats, assess potential threats, calculate risk, start policy development and create a remediation plan. We strive to meet your needs and create a customized plan that fits your business needs

Executive Security Protection

Cyber Advisors Executive Security Protection (ESP) is transforming the security of executives and their families to better protect them from today’s society of increasing connectivity, creating ever-evolving cyber threats. ESP is a program for executives and their families and is intended to increase awareness of information security risks, protect their information, identities and assets. Cyber Advisors has developed this program to deliver a concise product while maintaining efficiency of time.

Digital & IT Transformation

Managed Services