2 min read

cybersecurity-post

Enhance Your Security
with Telelink’s Posture Assessment

    Secure your spot on the waiting list for a complimentary cybersecurity posture assessment:

    Although the Cybersecurity Posture Assessment service of Telelink Business Services is non-intrusive by nature, by submitting this form you agree to give us consent to proceed with this assessment of your organization and receive back a report and other relevant information from Telelink Business Services.

    Digital Footprint

    During this stage our team will identify publicly accessible hosts associated with your company and their corresponding core technologies. Hosts that will be discovered but are not accessible will not be included in the final report.

    Web Site Encryption

    Our team will check the information about the SSL certificates status on the different hosts, part of your infrastructure as SSL certificates play a prominent role in safeguarding communication by encrypting the traffic between the client and the server.

    DNS Health

    This stage aims to review the configuration of the DNS servers owned by your company. The Telelink Business Services’ team of experts will check for common misconfigurations – the lack of certain records in the DNS zone (SPF, DKIM, DMARC, other), recursive DNS queries, zone transfer possibilities and other.

    Domain Reputation

    During this stage our team of experts will check the IP addresses owned by your company against public real-time blacklists for any positive results which may suggest unauthorized sending of spam messages meaning it can be a sign of malicious activity from within the organization.

    Web Application Security 

    Our team will investigate common misconfigurations in the web applications in use by your organization – without engaging with the web apps dynamically but just looking for potentially vulnerable software versions, HTTP Response headers, Cookie settings, Anti-CSRF tokens, SSL certificate checks, etc.

    Network Security

    Our team will assess the server’s configuration that are part of your organization’s internet-facing infrastructure – open ports, their running services and security issues associated with their corresponding versions (if any).

    Disclosure of Public Assets

    Our team will try to find publicly accessible files associated with your organization that include sensitive information, such as metadata valuable entries.

    Leaked Credentials and Privacy

    During this phase our team will try to find employee’s credentials associated with your organization’s domains in public databases of leaked credentials as finding such active user’s credentials usually is a trigger to hackers deciding to attack.

    Privacy

    Review of the websites’ privacy policy whether it is in compliance with the privacy requirements set out by the General Data Protection Regulation (GDPR).

    Key features

    Service Engagement Process

    Initial Consultation

    Understanding the company’s business context, specific concerns, and objectives for the cybersecurity assessment.

    Understanding the company’s business context, specific concerns, and objectives for the cybersecurity assessment.

    Assessment Execution

    Deployment of a team of cybersecurity experts to conduct a thorough assessment using a blend of automated tools and manual techniques.

    Deployment of a team of cybersecurity experts to conduct a thorough assessment using a blend of automated tools and manual techniques.

    Report Presentation and Review

    Presentation of findings and recommendations, followed by a Q&A session to clarify and discuss the next steps.

    Presentation of findings and recommendations, followed by a Q&A session to clarify and discuss the next steps.

    Follow-Up Support

    Optional post-assessment support to assist with the implementation of recommended actions and measures.

    Optional post-assessment support to assist with the implementation of recommended actions and measures.

    Team composition

    The team consists of penetration testers with years of experience in the field of professional ethical hacking, holding internationally recognized certifications in this area, such as OSCP, OSWP, CEH and JPT. The team employs during the tests advanced techniques to simulate real-world cyber-attacks, identifying potential entry points, weaknesses, and vulnerabilities that malicious actors could exploit.

    Cost optimization of the IT environment and minimization of the risks of the attack

    With recent upcoming of various new very strict cybersecurity requirements for a large number of companies throughout almost every industry vertical in the European Union, we would like to emphasize two topics, and together with leading vendors, help you mitigate all known and unknown risks while optimizing the resources needed. Sounds challenging but we believe it can be feasible.
    If financial penalties of local and EU agencies for being in breach or not compliant with DORA, GDPR, NIS2 or other of many regulations are not motivating enough, something like making your everyday business running on optimally efficient resources, and proactively reducing of risk exposure, could be.