Cyber Threat Intelligence Services and Monitoring
What threats to your organisation's security lie in the furthest corners of the Internet and on the Dark Web?
Are you a DISP member looking to uplift to E8 Maturity Level 2?
What threats to your organisation's security lie in the furthest corners of the Internet and on the Dark Web?
Intelligence Services combine various information gathering methods, tooling and expert knowledge to detect findings that may be advantageous to an attacker and not detected by traditional scanners and penetration testing.
Our reports are highly regarded for their business utility. They will detail your risks and provide a suggested course of action to remediate against the findings.
Our cybersecurity consultants can identify what is to be found, originating from your organisation, beyond your network borders, that could pose a threat. Investigating, for example:
We look to see what shouldn’t be there….ie stolen data, personal information leakage, breached credentials, proprietary code etc. This can often be the first indication that you have had a breach!
Intelligence Snapshot
This is a point-in-time baseline intelligence engagement to gain an insight into publicly available information across a handful of pre-selected domains. It also includes a human component where we identify key staff, based on their roles in your organisation, and investigate their social media presence and if there is any potentially valuable information that can be used to target that individual.
Intelligence Program
This is a continuously evolving intelligence engagement delivered quarterly, driven by client feedback. It includes identification and analysis of key staff and their social media risks as in the Intelligence Snapshot service and also organisational elements, using a range of intelligence methods including OSINT, SOCMINT, HUMINT, DARKINT, GEOINT etc. This engagement can be both passive and active. The report is delivered every three months and is a point-in-time analysis.
Continuous Monitoring
Along with the Intelligence Program that provides quarterly reporting, this service includes continuous monitoring of the Dark Web. It covers threats such as new data breaches, databases for sale, confidential information leaks and new ransomware information. All positive alerts will be passed on and an initial assessment provided. Further investigation, or remediation will be at additional cost.
In an interview with TickerTV, Tesserent CIO, Michael McKinnon, explains the significance and dangers of the dark web, and its role in data breaches and ransom attempts.
Publishing data online has become a common modus operandi for cyber criminals—but will Aussie organisations even notice when it happens?
Tesserent is a full-service cybersecurity and secure cloud services provider, partnering with clients from all industries and all levels of government. Let’s talk.