First Step
Web Assessment
Other Cyber PATH Services
Lots of us depend on our websites. This service assesses your site and web service for weakness. We'll describe in plain language what our finding means to your business, and how great the risk is. And of course, our report will include plans and guidance on how to fix the weaknesses.
Web Vulnerability Assessment
The service will scrutinise your internal networks and systems. We look for weaknesses such as poorly maintained or designed systems, insecure Wi-Fi networks, insecure access controls, or opportunities to access and steal sensitive data.
Internal Vulnerability Assessment
Remote vulnerability assessments are focused on identifying weaknesses in the way your organisation connects to the internet. We'll provide a plain language interpretation of our probing, reveal any vulnerabilities that might be used by an attacker, and give simple recommendations on how to get safer.
Remote Vulnerability Assessment
The training is focused on those with little or no cyber security or technical knowledge. We make it bespoke to your industry, and to you. Also, we can often access free training from your local policing team. Just ask.
Security Awareness Training
What could a criminal find out about your company, its systems, and its contacts online? This investigation gives you an analysis of what's out there, including information that might create reputational risk. Forewarned is forearmed.
Corporate Internet Investigation
We know that criminals often target those in positions of authority: and there's probably more information out there than you realise. This type of investigation might be used to manage potential threats to a Director, or a specific person of interest.
Individual Internet Investigation
This service offers a review of your current security policy, how it is written and how it is implemented. Because if you don't set the right parameters for your people and your activities, you're at much more risk than you need to be.
Security Policy Review
This service offers a review of your business continuity planning and the resilience of your organisation to cyber-attacks such as ransomware or when attackers take control of your core systems. We know what happens in an attack, and your plans need to consider all angles.