SUPPORT IN THE FIELD
OF CYBERSECURITY
Moving on to the implementation stage, we take three further steps:
Our analysis includes:
A. Analysis of client computers (penetration test)
B. Server analysis (penetration test)
C. Internal / external network analysis (penetration test)
D. Interview with IT department
E. Interview with employees
A. Observed software / hardware vulnerabilities - Solutions
B. Employee training: Security / Social Engineering
C. Training for IT departmen
The proper IT audit begins with consultation with the company’s IT department to obtain information on how the company’s IT infrastructure works, including security policy, internal network and connection to internet services. This is followed by an environmental interview with company employees to determine the level of threat and dangerous behaviors related to computer use, including interviews and introduction of social engineering prevention. Subsequently, verification and analysis (penetration test) of the security level of the client’s computers and servers (along with services such as: email server, vpn, networks, etc.) takes place.
Nevertheless, there is a time and place for conducting the aforementioned audits. They are usually recommended after conducting discreet external and internal OSINT and HUMINT phases to determine the true nature of the alleged violations. Once the likelihood of such violations has been at least partially confirmed and the real problems have been narrowed down to achievable targets, our financial and IT teams come into action.
Unlike many consulting firms, LIBRIUM typically does NOT recommend an immediate IT or financial audit when such suspicions arise. The turmoil caused by such audits cannot always be reversed, and an audit that does not reveal true and conclusive evidence can often have catastrophic legal consequences, especially in the face of very pro-worker labor law in the CIS and CEE.
Cybersecurity issues are common in most companies. The business reality in any jurisdiction is that a faulty or dishonest employee will occur. Similarly, cases of unethical management practices or passing key, unauthorized information to competitors for personal gain will simply never disappear.
OUR SERVICES
ADDRESS AND REGISTERED OFFICE
ul. Puławska 77 lok. U.5
02-595 Warszawa.
Hint:
You can remove this information by activating Premium Plan