top of page
Cyber Checkup®
25 YEARS OF EXPERIENCE IN CYBERSECURITY
​
Our ethical hacking practices are based on internationally recognized industry standards, mainly those associated with OWASP, OSSTMM.
​
Our recommendations are aimed, although at correcting technical vulnerabilities, at implementing controls or improving their effectiveness.
​
The different phases that make up the service are:
Recognition - Scan
Exploitation
Post-Exploitation - Report
CYBER SECURITY SERVICES
REACT
Incident Handling
Forensics
DISCOVER
External
internal
Code auditing
App & Portal
Cis 20
ANSWER
-
hardening
PREVENT
-
cyber eye
bottom of page