CYBER RISK CATALOG
Cybersecurity Assessments & Penetration Tests
External Network Penetration Test
Your external network can be potentially attacked every day and any small misconfiguration, outdated/obsolete services, and many other low-hanging fruit external vulnerabilities can be fatal to your organization. Tacticly’s external network penetration testing identifies vulnerabilities on externally facing assets such as infrastructure devices and servers accessible from the internet. External penetration testing assesses the security posture of any security appliances within your organization that filters malicious traffic from the internet such as firewalls, and detection systems. For more detailed information, please feel free to contact us.
Internal Network Penetration Test
Tacticly’s approach to internal network penetration testing is that our solution acts an as attacker positioned on the inside of the local area network. We look for privileged company information and other sensitive assets. This involves incorporating a variety of objective-based attack paths, uncovering user credentials, and attempting to compromise both virtual and physical machines present in the network environment. The benefit of internal network penetration testing is that you can ensure a breach of your external network will not result in a breach of your internal assets. For more detailed information, please feel free to contact us.
Network Segmentation Test
Tacticly’s network segmentation test is a type of cybersecurity assessment that involves evaluating the effectiveness of network segmentation controls in separating and isolating different areas of a network. In a network segmentation test, Tacticly will attempt to breach the boundaries between network segments to determine whether the segmentation controls are working effectively. This can involve attempting to access sensitive data or systems that should be restricted to specific segments, or attempting to move from one segment to another without authorization. The goal of our network segmentation test is to identify any vulnerabilities or weaknesses in the network segmentation controls, and to provide recommendations for improving them. This can help organizations to strengthen their overall security posture and reduce the risk of successful cyberattacks. For more detailed information, please feel free to contact us.
Web Application Penetration Test
Tacticly’s web application penetration testing involves testing the security of a web application by attempting to identify and exploit vulnerabilities that could be used by attackers to compromise the application, steal sensitive data, or gain unauthorized access to systems or networks. Many organizations are relying on web applications and APIs to conduct business, and not periodically testing for any security gaps leaves the door open for a possible cyberattack. Our solution follows OWASP security testing protocol to ensure that your organization is not at risk. For more detailed information, please feel free to contact us.
Mobile Application Penetration Test
Tacticly’s mobile application penetration testing is based on OWASP methodologies and on the experience of our expert-level cybersecurity practitioners. We analyze your mobile applications (Android/iOS) in search of potential vulnerabilities, associated with the application development stage, and provide you insight into what security gaps are leaving you open to threat actors. For more detailed information, please feel free to contact us.
Wireless Network Penetration Test
Tacticly’s wireless (WiFi) network penetration testing checks to see if your wireless networks may be susceptible to a numerous attacks. This depends on the wireless clients, access points, and wireless configurations. Wireless networks are a common target, as a compromise of the wireless network is generally the fastest means to the internal network. Misconfigurations and weak protection protocol could leave your internal information exposed to anyone in range with a laptop or smartphone. Tacticly tests the range of the network in addition to the range of potential vulnerabilities. For more detailed information, please feel free to contact us.
Cloud Configuration Assessment
Tacticly’s cloud configuration assessment involves evaluating the security of an organization’s cloud infrastructure and configuration settings. Typical platforms and services include Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP). Cloud configuration assessments are important because misconfigured cloud settings can expose sensitive data and systems to unauthorized access or attacks. Cloud providers offer a wide range of security controls, but it is the responsibility of your organization to ensure that these controls are properly configured and maintained. For more detailed information, please feel free to contact us.
Social Engineering Exercises
Tacticly’s social engineering spear-phishing assessment attempts to gain sensitive information or access from a target user through coercive emails. Most dangerous and destructive cyberattacks start through social engineering, which showcases the effectiveness of these campaigns. Many attackers can often leverage public information to craft compelling emails while impersonating someone trustworthy, such as someone in your organization. The primary concern of these exercises is to ensure that attackers are not able to enter your organization for larger attacks. For more detailed information, please feel free to contact us.
Physical Security Assessment
Tacticly’s physical security assessment evaluates physical security measures of your organization’s facilities to protect against unauthorized access, theft, and other risks. There is a physical inspection done to survey the sites. Threat and vulnerability assessments are performed to gauge the effectiveness of access controls, surveillance systems, alarms, and unauthorized access. If there are any human errors and lack of security around certain areas, those weak points will be exploited and all risks will be identified to document as a way to help your organization lower the risk of compromise. For more detailed information, please feel free to contact us.
Firewall Configuration Assessment
Setting up a firewall for your infrastructure/organization’s network is a great way to provide security for your services, but often times there are misconfigurations that cause services to be visible to attackers. Once you’ve developed a policy you are happy with, the next step is to test your firewall configurations and rules. It is important to understand and know whether your firewall rules are doing what you think they are doing. Our assessment serves to allow you to get an impression of what your organization’s security looks like to the outside world. For more detailed information, please feel free to contact us.
Cyber Crisis Tabletop Exercises
Tacticly’s cyber attack tabletop exercise is a test of your organization’s ability to respond to a cyberattack. We help you evaluate how effective your cyber incident response plans are. We’re looking to test your awareness in case of a cyber incident. The tabletop exercise is a scenario that mimics a real cybersecurity incident which could have a damaging impact on your business continuity. This exercises forces your organization to think and make decisions like they would when an actual incident occurs. Participants should ideally include members of the executive team, Information Technology/Security teams, and Incident Response team members. For more detailed information, please feel free to contact us.
Corporate Cybersecurity Policy Creation and Review
Tacticly will develop a standardized set of practices and procedures designed to protect your organization from any threats. These policies are reviewed for your satisfaction and ensures there is an overall increase in your security posture by looking at low-hanging fruit areas such as password requirements all the way to high-level guidelines such as handling sensitive data and understanding how to report upstream when there are potential threats looming. For more detailed information, please feel free to contact us.
NIST-CSF Report
The NIST Cybersecurity Framework is widely recognized for managing and improving your organization’s security posture. There are a set of guidelines and best practices managing cybersecurity risks. The five core functions of the NIST-CSF are to identify your assets, systems and data that require protection, have safeguards to protect them, implement processes to detect any malicious activity, develop plans to respond accordingly to incidents, and understand how to recover from incidents and return to normal operations. Tacticly will provide a detailed report around those core functions, communicating any recommendations for improvement and ensuring compliance and regulatory requirements. For more detailed information, please feel free to contact us.
Ransomware Readiness Assessment (RRA)
Tacticly’s Ransomware Readiness Assessment is designed to evaluate the effectiveness of your organization’s technical security controls/tools and capabilities in response to ransomware attacks. Our assessment services to increase visibility and awareness to the weaknesses within your environments, understand where and how to remediate the vulnerabilities to lower your risk exposure, and allow you to enhance your security posture with major improvements from testing the attack surface, internal network, social engineering susceptibilities, and breach and attack simulations. For more detailed information, please feel free to contact us.
Merger and Acquisitions Security Assessment (MASA)
Tacticly’s Merger & Acquisition (M&A) Security Assessment provide your organization with a cost-efficient, highly effective security review during the merger or acquisition process. Understand an asset’s cybersecurity posture pre-merger to aid in the final transaction. Often time, this assessment identifies major security gaps that will put the entire asset at risk. Our solution will analyze the risk and security posture of an asset and can be combined with vulnerability assessments, social engineering, penetration testing, and so on. After the analysis, a report is delivered which outlines major gaps, observations, and recommendations to help you move forward with your decision. Post-merger, the M&A assessment can be enhanced to provide a proper strategic plan, program maturity rating, and/or best practice gap assessment. For more detailed information, please feel free to contact us.
SIEM Assessment Gap Analysis (SAGA)
Without configuring and optimizing your SIEM properly, it can be just another logging system which collects large amounts of logs and events that either do not make sense on their own or paint only part of the picture. Tacticly addresses potential gaps in the existing SIEM technology to ensure that the appropriate correlational data, analysis, logs, and events are collected and aggregated. This analysis provides best practices to get the most value out of current SIEM investment. For more detailed information, please feel free to contact us.
Capture-The-Flag Exercise – Purple Team (CTF)
Tacticly provides a Capture-The-Flag Purple Team Exercise where both offensive and defensive operations are able to simulate a ‘real-world’ cybersecurity attack. The goal is to have the red team attempt to breach your organization’s defenses, where the blue team will detect and respond accordingly. Any vulnerabilities discovered are exploited in a simulated environment and the blue team will monitor for any malicious activity. This acts as a learning experience to improve detection and response capabilities. For more detailed information, please feel free to contact us.
Red Team Assessment (RTA)
Tacticly offers a red team assessment where attacks are designed to measure how well your organization can withstand real-life threat actors. This allows you to prepare for the unexpected as these assessments encompass all attack surfaces that are agreed upon. Many attack vectors are leveraged by the red team to properly demonstrate the severity and risk of compromise that your organization could be exposed to. For more detailed information, please feel free to contact us.
Are we the right fit for you?
We’ve helped hundreds of companies, just like yours, secure their organizations. That doesn’t always mean we’re the right choice for you. Let’s find out! Reach out to us today.