Professional Intelligence Operators
North Cyber brings together former intelligence services and special forces officers in the delivery of cyber investigative and defensive capabilities. Our uniquely skilled staff have years of operational experience in covert operations online and in the field.
We serve corporate, government and High Net-Worth (HNW) clients. We operate globally and our staff hold the highest levels of government security clearance.
Although we do not publicly advertise our full range of services, below may be found a selection of our capabilities. Contact us if you have a serious requirement and wish to discuss specific services.
business @ northcyber.com
RED TEAM: FULL SPECTRUM PENETRATION TESTING
Directing the skills of technical penetration testers, physical security experts and social engineers at an organisation’s security measures in a single campaign of co-ordinated strikes.
“Anti-SEO.” We specialise in the removal and concealment of unwanted data online, with customers including corporations and individuals.
INVESTIGATION & FINDING PERSONS
We have an impressive record of locating individuals who believe themselves unfindable. Conversely, we provide an assurance to potentially vulnerable individuals that their whereabouts are concealed
BESPOKE SECURE EQUIPMENT
We develop secure, covert electronic platforms according to the needs of our clients, such as encrypted laptops with invisible data storage, and covert communications methods
Beyond the human firewall
Full Spectrum Penetration Testing
Most organisations misunderstand the true vulnerabilities in “cyber” security, hence the global annual expenditure of billions of dollars in anti-virus and firewalls.
In reality, “IT security” is well served, but what needs correcting is the attitude toward information security. Why attempt to technically ‘hack’ a company when you could persuade someone to give them a password, or even show you right into the server room in person ?
North Cyber draws on many years of experience in the fields of technical and human influence operations. Social engineering, the subtle attacking of the human infrastructure, is the real power of the full spectrum penetration test, performed in true Red Team fashion in co-ordination with technical attacks and physical security testing.