top of page



​​Every person interacting with digital-services, social media sites and the internet leaves what is known as a footprint.  Many organisations and individuals are unaware of the volume of information placed online (by both themselves and other parties) on multiple platforms, and most importantly, how this information could be used against them. 

There have been many examples where a member of an organisation's C-suite, a high-net worth individual (HNWI), or their supporting personnel (executive/personnel assistants) have been targeted by adversaries for attacks. In many cases these have been based on successful acquisition of information gained during an online reconnaissance phase and used to spoof emails or phone calls and ultimately gain access (often in combination with technically-based attacks) to privileged or propriatary information.

Following confirmation of the assessment scope, through implementation of a four-phase approach we can carry out a thorough review of both individual and organisational online footprints, based on publically available information and utlisation of mulitple industry tools. 

Following subsequent analysis of the information discovered a comprehensive report will be produced and delivered, documenting potential social engineering-related threat vectors and risks, together with recommendations to minimise potentially sensitive information being made publically available to adversaries which could be used for malicious intent.


In a​ddtion to a review of both organisational and personal internet footprint, we will also include a review of potentially comprised account credentials and personally identifiable information (PII) that have been exposed through data breaches. 

As a result of the assessment, the subject can review behaviours to improve individual/family/corporate personal safety, reduce overall online risk and establish good online practices.

assessment reasons.PNG

All activities are carried out by certified and experienced OSINT analysts using industry best-practice methodologies, tools and processes. All research activites are carried out in full compliance of UK law and the EU General Data Protection Regulations.

​​​Please contact us for more information and to discuss your requirements in this area.

bottom of page