CYBER INTELLIGENCE

North Cyber specialises in complex investigations and security testing.

We provide investigative, testing, training and consultation services to individuals and organisations.

INVESTIGATIONS

Corporate security, criminal investigations, defensive vulnerability assessments

PENETRATION TESTING

Technical penetration, social engineering, physical incursion

TRAINING

OSINT research, privacy awareness and management, social engineering skills

CONSULTATION

One-on-one advice, whole organisation reviews, crisis response (CIRP)

WHAT WE DO

North Cyber uses deep open source intelligence (OSINT) expertise to make you more secure.

We investigate threats to you or your organisation; test your defensive measures; advise you on your vulnerabilities and how you can mitigate them; and deliver on-site cyber training.

Investigation

INVESTIGATIONS

Corporate security

Criminal investigations

Defensive vulnerability assessments

Specialising in OSINT, we perform a wide range of investigations for individuals and organisations. Much of our work is defensive in nature – finding the vulnerabilities before the bad guy does.

Corporate    intellectual property theft, malicious insiders, business intelligence

Criminal       fraud, scams, threats, crypto investigation

Defensive    board member exposure, HNW vulnerability, family risk

PENETRATION TESTING

PENETRATION TESTING

Technical penetration

Social engineering

Physical incursion

With our background in government operations, we are uniquely placed to simulate how a hostile party will try to penetrate your organisation. We usually work from a start point of zero privileged information, for maximum realism.

Our real strength is in combining multiple skill-sets into a single “Red Team”, acting as the bad guys do to penetrate an organisation, then reporting in detail how to strengthen your defences.

The scope can be as narrow or as wide as you need, from web app testing to full simulated attack.

Our activity can simply be passive reporting on what vulnerabilities we find, or “trigger pull” active tests.

Our team holds accreditations from OffSec, The Cyber Scheme, CHECK and CREST.

CONSULTATION

CONSULTATION

One-on-one advice

Whole-organisation reviews

Crisis response and preparation

We provide advice and reviews on any aspect of your online security, from one-on-one advice to individuals to whole-organisation information security reviews.

We also deliver crisis response for cyber incidents, and can assist in the development of a

Cyber Incident Response Plan (CIRP) to prepare your organisation before the worst happens.

TRAINING

TRAINING

OSINT research

Privacy awareness and management

Social engineering skills

Our team is comprised of seasoned professionals who are both experienced trainers and busy practitioners.

We offer training based on our real-world experience, tailored to your specific requirements.

Our primary offerings are in the areas of:

Research    comprehensive OSINT training delivered by experienced practitioners

Privacy        awareness of your digital footprint, and how to reduce your attack surface

SE skills      for governmental clients only, how to leverage psychology online

WHO WE ARE

North Cyber utilises staff drawn exclusively from governmental backgrounds, with a range of specialist and niche abilities that can be drawn upon for any given task.

Collectively, we have many decades of experience at the cutting edge of investigations and cyber operations. Our testers are accredited by OffSec, The Cyber Scheme, CHECK and CREST.

Our unique strength lies in our ability to combine the technical and the human aspects of cyber security.

WHERE WE OPERATE

We are a company with genuine global reach.

Our previous engagements have involved clients in Europe, the Americas, the Caribbean, the Middle East, Sub-Saharan Africa, East Asia, Australasia, and Oceania.

If you have a requirement, please get in touch.

CONTACT

  Wire secure messenger: ncyber

   Email: query [at] northcyber.com

    All of North Cyber’s email communications are handled by Protonmail.

As security professionals, your privacy is important to us. Contact us from a Protonmail address if you wish to initiate a conversation that is end-to-end encrypted from the outset.