HUMAN RED TEAM
part of SYNOVUM CYBER SECURITY
SERVICE OVERVIEW
Organisations often deploy multiple control measures to protect their information assets, whether they be physical (barriers, fences), technical (firewalls, intrusion prevention systems) or administrative (policies, procedures) but neglect to implement comprehensive measures to protect their people assets.
In many cases, physical and technical implementation measures are rendered useless if a securty guard is duped into allowing a person (with hostile intent) through a secure barrier, or if an employee in the marketing team is fooled into giving away login credentials to an adversary claiming to be from the IT helpdesk.
Many organisations regard their employees as the ''weak point' - we can help your organisation improve its security posture with regard to your people.
RESEARCHING
Open-source intelligence (OSINT), together with social media intelligence (SOCMINT) can be defined as information acquired from mulitiple publicly available sources and subsequently analysed to provide useful intelligence, which can in turn be used to initiate further information acquisition or other related tasks.
Both OSINT and SOCMINT have become critical tool due to the widespread use of Internet-enabled mobile devices and associated prevalence of social media for the sharing of information and communication.
Many organisations and individuals are unaware of the volume of information posted (by both themselves and other parties) on mulitple platforms, and most importantly, how this information could be used against them.
INFLUENCING
Social engineering has been defined as "...any act that influences a person to take an action that may or may not be in their best interest".
Given the prevalence social engineering-based attacks in recent times, it is vital that organisations understand the risks to both their organisations and specific individuals who may more susceptable to this type of attack, whether it be by phone (vishing), email (phishing, business email compromise (BEC)), or face-to-face (impersonation)
REPORTING
As part of any assessment task, it is vital that a comprehensive report can be provided which highlights information discovered, areas of concern and which provided comprehensive analyais and recommendations for next steps.
Given the nature of the content, all reports should regarded as confidential and should be protected accordingly.
TRAINING
The importance of organisations providing quality edcuation and training in the area of security awareness should not be underestimated. Annual 'awareness training by powerpoint' has been shown to be in-efffective when ensuring that messages are both understood and good practice adopted on a continual basis.
Ongoing and regular training and knowledge development sessions are key to making sure that employees have the knowledge and skills to be continually aware of the 'human risks' and how to minimise them.