Testing & Prevention

Prevent Data Loss With Penetration Testing

The first step to protecting yourself and your business is knowing where you are vulnerable. Centurion Cyber Defence offers both penetration testing, to find where your organization’s vulnerabilities are, and training, so that your organization can address vulnerabilities, and successfully resist attacks should they occur.

We combine the knowledge of how vulnerabilities are exploited with the wisdom of knowing why they exist in the first place. Penetration testing is not only for large companies. Our team will work with you to make sure that your websites and applications are tested against known intrusion techniques.

We will assess your current vulnerabilities and make recommendations based on industry standards and best practices.

Integrated Penetration Test

Our integrated penetration testing package is an exhaustive analysis of your organization’s cybersecurity measures and posture. 

External Penetration Test

Your organization’s security is only as robust as its hardware. We will undertake a battery of direct-access penetration tests, with the intent of exposing any vulnerabilities that might exist in your organization’s network and computer infrastructure and hardware. From the results, we can advise you what hardware or configuration changes are needed to keep your organization safe.

Website Penetration Test

A company’s reputation depends on a healthy web presence. We will test your organization’s front-end web assets against known and expected vulnerabilities, including common Denial of Service and web vandalism methods, and make recommendations to ensure your most public asset is secure.

Phishing Campaign

We will attempt to extract information from your organization, using various combinations of disguised emails, telephone calls, and other deceptions. As phishing is an example of social engineering, we will incorporate both publicly available information about your organization and its employees, and intentionally misrepresent and mislead, in order to try and elicit the release of information.

Deep Web Crawl

Our team of testers will scour social media and public-facing web services for examples of proprietary information from your organization. Once we know how much information is publicly available, we will go deeper into the Dark Web, searching for examples of personal credentials, identifying info, and payment details that may have been stolen and put up for black market sale. From this, we can identify which of your accounts may be compromised, as well as what steps need to be taken to ensure you remain secure.

Systems-Only Testing

A highly focused testing regimen designed to test your organization’s technological capacity to resist attack.

External Penetration Test

Your organization’s security is only as robust as its hardware. We will undertake a battery of direct-access penetration tests, with the intent of exposing any vulnerabilities that might exist in your organization’s network and computer infrastructure and hardware. From the results, we can advise you what hardware or configuration changes are needed to keep your organization safe.

Website Penetration Test

A company’s reputation depends on a healthy web presence. We will test your organization’s front-end web assets against known and expected vulnerabilities, including common Denial of Service and web vandalism methods, and make recommendations to ensure your most public asset is secure.

Social Engineering

This is concerted attempt at social engineering, in order to evaluate your organization’s awareness and training regarding threats like phishing. 

Phishing Campaign

We will attempt to extract information from your organization, using various combinations of disguised emails, telephone calls, and other deceptions. As phishing is an example of social engineering, we will incorporate both publicly available information about your organization and its employees, and intentionally misrepresent and mislead, in order to try and elicit the release of information.

Deep Web Crawl

Our team of testers will scour social media and public-facing web services for examples of proprietary information from your organization. Once we know how much information is publicly available, we will go deeper into the Dark Web, searching for examples of personal credentials, identifying info, and payment details that may have been stolen and put up for black market sale. From this, we can identify which of your accounts may be compromised, as well as what steps need to be taken to ensure you remain secure.

Small Market Program

The Small Market Program is a specialized offering intended for collectives or business communities who are already familiar with cooperating with each other. By applying together, organizations can receive testing and training at a more attractive rate.

Deep Web Crawl

Our team of testers will scour social media and public-facing web services for examples of proprietary information from your organization. Once we know how much information is publicly available, we will go deeper into the Dark Web, searching for examples of personal credentials, identifying info, and payment details that may have been stolen and put up for black market sale. From this, we can identify which of your accounts may be compromised, as well as what steps need to be taken to ensure you remain secure.

Web Application Penetration Test

Centurion Defence will test your organization’s back-end web applications for vulnerabilities to common attacks like buffer overflow and code injection. While often overlooked against more obvious threats, these kinds of leaks can result in massive privacy breaches and the theft of payment information. Meticulous testing is the best way to identify whether your organization is at risk.

Best Practices Guide

The best tool to defend against a cyber intrustions is education. Centurion Defence can custom-tailor a best-practices, cyber hygiene guide for your business or organization. The guide can then be used to train yourself and your staff in the bahaviours that will best protect your business, and maximize your confidence to conduct e-commerce.

Internet Of Things Scan

Modern, Internet-enabled devices, colloquially called the “Internet of Things,” are just as vulnerable as any other computer to a malicious hacker attack. Our team of ethical hackers will test your networked devices for vulnerabilities, ensuring these systems of convenience are not also liabilities.

Deep Web Investigation

Our White Hat hackers have the unique ability to dig into the Deep Web to find out just how much is known about you and your organization. We are able to determine if past leaks have compromised your organization, and whether malicious hackers are offering any of your proprietary data for sale.

Process Hacking

Process hacking often goes undetected. Our team will assess your organization’s business processes, such as onboarding and privilege escalation, making recommendations to protect your organization f rom hackers or malicious current or former staff.

IP Assessments & Reporting

We provide a comprehensive assessment of your current situation. Our reports provide detailed, plain-language breakdowns of your organization’s cyber risks.