Important! New mandatory data breach reporting laws may impact your company.

Services

Our Most Requested Services

  1. Managed Security Services

    Cyber security goes beyond traditional antivirus and malware protection. In today’s threat landscape these practices are not enough to protect your business from sophisticated cyber threats. Our Managed Security Services (MSS) provide 24/7/365 cyber security to ensure your network is safe no matter the time of day. Regardless of the various IT Security measures you may have in place, you don’t know if your network has been breached and how far an attacker has infiltrated your network. Managed Security Services (MSS) provide live monitoring of your system, detecting any attacks or other threats such as malware and virus infiltration. Our IT Security experts, who possess both GCIA and GCFA certifications, detect the threat, analyse the incident, and launch counter measures to prevent the attack going any further. They can even detect an attack before it has been successful, acting as a virtual guard dog for network. More Information

  2. Penetration Testing

    Penetration Testing is an authorized attempt for certified ethical ‘hackers’ to breach your system in order to identify its vulnerabilities and to safely close any flaws that real cyber criminals may exploit. At Cybernetic Global Intelligence we specialize in a full spectrum of penetration testing capabilities starting from information gathering, foot-printing, vulnerability assessment, exploitation, and reporting. Penetration testing is an excellent tool for evolving your cyber security as it provides a detailed analysis of where your IT Security weaknesses lie. A Penetration Test can be used to test yours servers, endpoints, networks devices, mobile devices, wireless networks and overall systems. More Information

  3. Security Audit

    Security Audits are a necessary and thorough end-to-end examination of your IT Security infrastructure. A Security Audit will determine if all your business’s security infrastructures and practices are performing in accordance to industry accepted standards such as CoBIT, and legal requirements specific to the industry and country. Our Security Audit is designed to cover all aspects of security management including People, Processes and Technology. The audit will also determine your most critical and sensitive assets and operations, and potential losses or damage that could occur if a threat materializes, including recovery costs. A Security Audit is an ideal way of Identifying cost-effective actions to mitigate or reduce IT Security Threats. These actions can include implementing new organizational IT Security policies and procedures as well as technical or physical controls for a cyber security attack. More Information

  4. Web Application Security

    To ensure your IT security is effective in deterring cyber attacks from all entry points you need to have your web applications tested. Developers often do not spend a sufficient amount of time on security which results in easily compromised web applications. If you are developing an app for your business, use WordPress, Joomla, ZenCart or any form of Web Application for your business, then you need to make sure they are properly protected by performing a Web Application Test. A compromised app can lead to poor IT security and result in malicious code being planted on your website, stolen sessions IDs (cookies), account information theft, database breaches, etc. More Information

  5. SCADA Security

    SCADA systems often have a life span of decades, which means whatever original security measures they have been developed with are long out dated. It is important to your overall IT Security that as SCADA systems become integrated with modern technology and internet access, that the threat to these systems is immediately assessed and patched. SCADA security is an integral part of ensuring the integrity of commands and that uptime availability is not compromised. Due to the minimal tolerance SCADA systems have for latency in their communications, scanning for network vulnerability and holes in cyber security is a necessity to ensure your business is safe from attack. More Information

  6. PCI Compliance

    If you use e-commerce on your website or EFTPOS machines for transactions then PCI Compliance is necessary to avoid liability in case of a breach and to avoid fines associated with not sufficiently protecting your customer’s credit card information. Cybernetic Global Intelligence provides consulting and PCI compliance certification services to comply with and audit the PCI DSS standard. These include conducting gap analysis, implementing the necessary controls and also preparing the Report on Compliance (ROC) Self-Assessment Questionnaire (SAQ) The ROC or SAQ is prepared by a QSA independent of any consulting engagement with the client. More Information

Vulnerability Assessment

  1. SCADA Security

    SCADA systems often have a life span of decades, which means whatever original security measures they have been developed with are long out dated. It is important to your overall IT Security that as SCADA systems become integrated with modern technology and internet access, that the threat to these systems is immediately assessed and patched. SCADA security is an integral part of ensuring the integrity of commands and that uptime availability is not compromised. Due to the minimal tolerance SCADA systems have for latency in their communications, scanning for network vulnerability and holes in cyber security is a necessity to ensure your business is safe from attack. More Information

  2. Web Application Security

    To ensure your IT security is effective in deterring cyber attacks from all entry points you need to have your web applications tested. Developers often do not spend a sufficient amount of time on security which results in easily compromised web applications. If you are developing an app for your business, use WordPress, Joomla, ZenCart or any form of Web Application for your business, then you need to make sure they are properly protected by performing a Web Application Test. A compromised app can lead to poor IT security and result in malicious code being planted on your website, stolen sessions IDs (cookies), account information theft, database breaches, etc. More Information

  3. Security Audit

    Security Audits are a necessary and thorough end-to-end examination of your IT Security infrastructure. A Security Audit will determine if all your business’s security infrastructures and practices are performing in accordance to industry accepted standards such as CoBIT, and legal requirements specific to the industry and country. Our Security Audit is designed to cover all aspects of security management including People, Processes and Technology. The audit will also determine your most critical and sensitive assets and operations, and potential losses or damage that could occur if a threat materializes, including recovery costs. A Security Audit is an ideal way of Identifying cost-effective actions to mitigate or reduce IT Security Threats. These actions can include implementing new organizational IT Security policies and procedures as well as technical or physical controls for a cyber security attack. More Information

  4. Penetration Testing

    Penetration Testing is an authorized attempt for certified ethical ‘hackers’ to breach your system in order to identify its vulnerabilities and to safely close any flaws that real cyber criminals may exploit. At Cybernetic Global Intelligence we specialize in a full spectrum of penetration testing capabilities starting from information gathering, foot-printing, vulnerability assessment, exploitation, and reporting. Penetration testing is an excellent tool for evolving your cyber security as it provides a detailed analysis of where your IT Security weaknesses lie. A Penetration Test can be used to test yours servers, endpoints, networks devices, mobile devices, wireless networks and overall systems. More Information


Threat Management

  1. Digital Forensics

    Our Digital Forensics service involves the use of scientifically derived and proven methods for recovery and investigation of material found in digital devices. This encompasses preservation, collection, validation, analysis, interpretation, documentation and presentation of digital evidence. We can extract evidence from multiple digital sources including flash drives and hard drives, as well as CDs, DVDs, audio/video tapes, and many more. More Information

  2. Incident Response

    This incident response plan defines what constitutes a security incident and outlines the incident response phases. This incident response plan document discusses how information is passed to the appropriate personnel, assessment of the incident, minimizing damage and response strategy, documentation, and preservation of evidence. The incident response plan will define areas of responsibility and establish procedures for handling various security incidents. More Information

  3. Managed Security Services (MSS)

    Cyber security goes beyond traditional antivirus and malware protection. In today’s threat landscape these practices are not enough to protect your business from sophisticated cyber threats. Our Managed Security Services (MSS) provide 24/7/365 cyber security to ensure your network is safe no matter the time of day. Regardless of the various IT Security measures you may have in place, you don’t know if your network has been breached and how far an attacker has infiltrated your network. Managed Security Services (MSS) provide live monitoring of your system, detecting any attacks or other threats such as malware and virus infiltration. Our IT Security experts, who possess both GCIA and GCFA certifications, detect the threat, analyse the incident, and launch counter measures to prevent the attack going any further. They can even detect an attack before it has been successful, acting as a virtual guard dog for network. More Information

  4. Telecom Security

    Information security and Computer security are disciplines that are dealing with the requirements of Confidentiality, Integrity, and Availability, of information asset of an organization (company or agency) or the information managed by computers respectively. There are threats that can attack the resources (information or devices to manage it) exploiting one or more vulnerabilities, the resources can be protected by one or more countermeasures or security controls. More Information


Compliance Management

  1. Risk Assessment

    The purpose of a Business Impact and Risk Assessment is to determine the approximate business value of IT assets, to assess the impact the loss of those assets would have on business units, and to assign recovery priorities to the assets, as well as risk reports and profiles for the business impact analysis. Consider revisiting your Business Impact and Risk Assessment annually. More Information

  2. PCI Compliance

    Cybernetic Global Intelligence provides consulting and compliance certification services to comply with and audit the PCI DSS standard. These include conducting gap analysis, implementing the necessary controls and also preparing the Report on Compliance (ROC) Self-Assessment Questionnaire (SAQ) The ROC or SAQ is prepared by a QSA independent of any consulting engagement with the client. More Information

  3. HIPPA Compliance

    Any organization maintaining or transmitting electronic protected health information, known commonly as ePHI, must comply with HIPAA. This includes business associates, which are contractors and subcontractors that perform services on behalf of a health insurance provider. ePHI is defined as “identifiable demographic and other information relating to the past, present, or future physical or mental health or condition of an individual.” HIPAA features three components related to data protection: the Security Rule, the Privacy Rule and the Breach Notification Rule. Each one is encompassed by the overarching Omnibus Rule, which took effect in 2013 and ushers in enforcement of business associates for the first time. The requirements of the Omnibus Rule were mandated by the Health Information Technology for Economic and Clinical Health (HITECH) Act, passed in 2009 as part of the economic stimulus bill. More Information

  4. Data Privacy

    Typically, entities are required to alert consumers, whose personal information was compromised, in an expeditious manner and without unreasonable delay. And even if the breach affects a third-party company that is maintaining the compromised information, the burden is on the company that owns the data to notify affected individuals. More Information