The Service

Red teaming involves a group of cybersecurity consultants performing a multi-faceted, ethical attack on your organisation’s digital infrastructure, in order to assess the effectiveness of your defences. Since cyber criminals do not play by any rules and will use any means necessary to steal or compromise sensitive data, red teaming will be a step above a penetration test. It will involve simulating real life attacks by replicating Techniques, Tactics and Procedures (TTPs) of a real-life adversary.

The Benefits

  • Align with industry regulations and security standards

  • Identify any information security areas overlooked

  • Identify vulnerabilities within all aspects of your organisation

  • Fortify your defences and prepare for the next exercise

  • Test effectiveness of your incident response plan

  • Identify and measure the risk and susceptibility of an attack against key information assets

  • Assess your ability to detect, respond and prevent TTP threats

The Challenge

Red teaming services would benefit any organisation who stores highly sensitive information and want to test the effectiveness of their security defences against targeted attacks. This may include high profile public or private sector organisations processing financial data, medical records or other special category personal data. This type of testing would also be useful if you hold highly valuable intellectual property that they need to protect.

Our Process

We will hold an initial kick-off meeting to discuss your objectives and agree on the criteria and main targets for the red teaming engagement.

Our highly qualified team of ethical hackers will then run a series of varied tests, to attempt to infiltrate your organisation and compromise your systems. At the end of this engagement, we will provide you with a report listing vulnerabilities ranked by criticality and severity, together with our expert advice and recommendations. Additionally, we will hold a review workshop with your relevant security staff, where lessons learnt and experiences will be shared.

We will look for vulnerabilities and look to exploit them across the following areas:

  • Technology: digital infrastructure, corporate and mobile applications, routers, switches and a variety of endpoints

  • People: employees, independent contractors, high-risk departments and business partners

  • Physical: office, warehouse, substations, data centres and associated buildings

Red Teaming activities may include the following;

  • An external attack using email spear phishing techniques using social engineering techniques

  • A traditional external penetration attack against agreed targets within your organisation

  • A social media profiling of key personnel, to gather enough data to further target these individuals with social engineering attacks

Let’s Talk

Please leave your contact details and a member of our team will be in touch shortly.