
A hundred ounces of silver spent on intelligence, may save ten thousand spent on war
Sun Tzu
Monitoring and Intelligence
The quest to be secure has not eased up of late. Even with all the knowledge, standards, policies, and know-how, we are still on the back foot.
Why?
- We are just too connected. Think about all the mobile devices, desktops and servers that we connect to the Internet everyday. Our footprint is of such a size that we cannot contemplate how exposed we are.
- Too much change, too often. There are so many new technologies and software out there, that we just cannot stay ahead with getting to grips with the issues each technology represent.
- Knowhow and skills. More technology, more buzz words, more everything - what do you focus on first, and what the heck must you do.
- Cost. The cyber security game has become a commodity game. Everyone has a tool or service that probably can do the job well, but the price tag is steep.
In the end, any company would probably just want to know:
- Am I exposed as I am now?
- Am I a homing beacon for attackers?
- What are the immediate glaring issues?
- Am I currently being targeted
- The Key Services
Internet Footprinting
Using commercial and home-grown DNS gathering techniques, we will collect information about your Internet footprint, ranging from those web sites you didn't know you had, domains names, IP addresses, social media accounts, and where warranted, dark web leaks and breaches.
This service is often subscribed to by large, federated organisations, where the security does not have a holistic view of the organisation.
Targeted phishing
Phishing attacks are arguably the more difficult of attack vectors to guard against. Using a myriad of techniques, we will develop bespoke phishing campaigns and purpose built payloads to test defence mechanisms, and end-user awareness.
Activity Monitoring
Activity monitoring is not about collecting all possible event logs and trying to make sense of it all. Our approach to attack monitoring is to understand your risk exposure and business first, and then decide which form of monitoring would be best suited for your needs.
Technologies which could be considered includes popular big data analytics and aggregators, simple syslog collectors, data visualisation platforms and honey pots.
© 2015-2017
Gravvel Consulting
A South African based consultancy