Red Team Ready?
Our red team assessment objective is to fully assault your organization and collect as much information possible about its vulnerabilities. Unlike some of our competitors we hold no punches when it comes to our testing. Doing so would be a disservice to our customers. Why? Because the bad actors out there are not going to have any boundaries. They are quite literally going to do whatever it takes to achieve their objective.
Our three essential attack vectors
Networks, websites, applications, routers, switches, appliances, etc. We deploy a full suite of automated attacks and assessments to determine the weakest point in your system. Then we exploit the hell out of it. This includes assessing the ability to crash a network, planting malware, unmounting drives and other nefarious activities that are on a hacker’s “to do” list.
Staff, independent contractors, vendors, departments, business partners, etc. Are you sure that’s actually a copy machine repair guy? Or is it our guy installing network and wireless equipment to sabotage your organization. By the way, that new employee – the one that was hired last week, he’s actually planted there and has been getting ready to launch his attack potentially costing your organization countless dollars in damages.
Offices, warehouses, substations, data centers, buildings, etc. Noticed that you go to the same restaurant every Tuesday, after work. Made cloning your RFID entry card lanyard you left on your car’s dashboard easy to do through the windshield. Now we have full access to your physical structure. We test and assess what a bad actor would do in order to get to your sensitive information and structures.
Is your organization red team ready?
Our assessment determines if you can survive a full-on attack, if your personnel can be compromised, or if your structures can be breached.
Big boy pants
Play time is over. Time to put the toys away. The encyphr Red Team Assessment is one of the most comprehensive security testing assessment available. Our testing is a no rules, no excuses, attack on everything that an organization holds dear. We commence with a comprehensive background study on your organization. What makes it tick? What does it do? Demographics, markets, growth, worth, footprint etc. All this information provides us with the “fingerprint” of your organization and provides possible avenues to breach it. We then move on to personnel – who are they? What are their backgrounds, habits, faults etc. All it takes is one compromised employee to give us an avenue into your organization. Then we look at the physical structure of your organization. We look at entry/exit points, shift changes, physical location, access, construction. Think a deadbolt lock and some CCTV cameras are enough to protect your location? Think again.
Red Team composition
Encyphr red teams are comprised of between 5 to 7 people. Each one specializes in a specific area of expertise. Together they make one of the most formidable threats that an organization will ever experience. It’s the real-world operation that exposes what simulation never can. Quite frankly, a lot of organizations are not ready for a Red Team Assessment. They are not comfortable with the thought of having their company and staff attacked and scrutinized. However, when contemplating whether or not to use our services, be aware that the bad guys out there don’t care one iota about your comfort. Then have solace knowing that when remediation of open vectors occur, the likelihood of a bad actors/groups breaching your security are greatly mitigated.
*Red Team Assessment retainers start at $35,000USD