Awareness Talks

Awareness Talks

The more conscientious your employees are the more secure your business is.

Pen Testing

Pen Testing

We can check your network vulnerabilities and give recommendations to fix them.

Digital Forensics

Digital Forensics

We can recover your lost or damaged data due to accidental deletion.

Code Audits

Code Audits

We can perform a vulnerabilities assesment on your source code for security.

What we offer

“You bastard!”, “You are a fascist nazi!”, “I hate stupid people like you” he read on his Facebook inbox messages coming from many people.

Just a few weeks ago I was at a Birthday party with some friends, and I was asked if Whatsapp is really secure. "Depends on how you use it" I said.

"What did you say? Encrypting my mobile phone? Can I really do that?" my friend asked after I suggested he should encrypt his personal data contained on his mobile phone...

The year is about to finish, and we all are ready for the final countdown to welcome to the New Year. It is time to review the famous cyber-attacks...

"Be careful and do not turn on your computer tomorrow, or a computer virus will activate". Everybody has listened to these words since the 90s. In fact some friends of mine...

“Shutdown that bloody computer right now! We’ve just detected it is running a cypher operation on the hard disk! Shut it down now!!” said the guy in charge of the Information Security department...

The year is about to finish, and we all are ready for the final countdown to welcome to the New Year. It is time to review the famous cyber-attacks...

"Well, what've you got?" asked the customer. The waiter replied "Well, there's egg and bacon; egg sausage and bacon; egg and spam; egg bacon and spam; egg bacon sausage and spam; spam...

Lots of people have only one password for all accounts, and very often it is very weak too. This is pretty much like leaving your key under the doormat and thinking nobody will look there.