{"id":512,"date":"2025-01-26T12:54:23","date_gmt":"2025-01-26T12:54:23","guid":{"rendered":"https:\/\/northcyber.com\/?page_id=512"},"modified":"2025-02-05T20:03:59","modified_gmt":"2025-02-05T20:03:59","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/northcyber.com\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"\n[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/northcyber.com\/wp-content\/uploads\/2025\/01\/background_main.jpg&#8221; custom_padding=&#8221;||1px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Abel||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;35px&#8221; text_line_height=&#8221;1em&#8221; header_font=&#8221;Abel|700|||||||&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;70px&#8221; header_line_height=&#8221;1.4em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;200px||200px||true|false&#8221; custom_margin_tablet=&#8221;160px||100px||false|false&#8221; custom_margin_phone=&#8221;170px||120px||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; hover_enabled=&#8221;0&#8243; text_font_size_tablet=&#8221;35px&#8221; text_font_size_phone=&#8221;20px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;70px&#8221; header_font_size_phone=&#8221;38px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<h1 class=\"p1\"><span class=\"s1\">CYBER INTELLIGENCE<\/span><\/h1>\n<p class=\"p1\"><span class=\"s1\">North Cyber specialises in complex investigations and security testing. <\/span><span class=\"s1\"><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">We provide investigative, testing, training and consultation services <\/span><span class=\"s1\">to individuals and organisations.<\/span><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_slider show_pagination=&#8221;off&#8221; arrows_custom_color=&#8221;#FFFFFF&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; module_alignment=&#8221;left&#8221; custom_padding=&#8221;10px||10px||true|false&#8221; auto=&#8221;on&#8221; auto_speed=&#8221;4000&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_slide button_text=&#8221;LEARN MORE&#8221; button_link=&#8221;#INVESTIGATIONS&#8221; use_bg_overlay=&#8221;off&#8221; use_text_overlay=&#8221;off&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h5&#8243; header_font=&#8221;Abel||||||||&#8221; header_font_size=&#8221;66px&#8221; header_letter_spacing=&#8221;12px&#8221; body_font=&#8221;Abel||||||||&#8221; body_font_size=&#8221;20px&#8221; body_line_height=&#8221;1em&#8221; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/northcyber.com\/wp-content\/uploads\/2025\/01\/background_peach-blue.jpg&#8221; background_enable_image=&#8221;on&#8221; background_position=&#8221;top_right&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;22px&#8221; button_border_radius=&#8221;100px&#8221; button_font=&#8221;Abel||||||||&#8221; button_use_icon=&#8221;off&#8221; button_custom_padding=&#8221;|40px||40px|false|true&#8221; button_custom_padding_tablet=&#8221;|38px||38px|false|true&#8221; button_custom_padding_phone=&#8221;|25px||25px|false|true&#8221; button_custom_padding_last_edited=&#8221;on|desktop&#8221; text_orientation=&#8221;left&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; header_font_size_tablet=&#8221;50px&#8221; header_font_size_phone=&#8221;32px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; body_font_size_tablet=&#8221;25px&#8221; body_font_size_phone=&#8221;18px&#8221; body_font_size_last_edited=&#8221;on|phone&#8221; button_text_size_tablet=&#8221;21px&#8221; button_text_size_phone=&#8221;17px&#8221; button_text_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; button_bg_color__hover_enabled=&#8221;on|desktop&#8221; button_bg_color__hover=&#8221;#FFFFFF&#8221; button_bg_enable_color__hover=&#8221;on&#8221; button_text_color__hover_enabled=&#8221;on|hover&#8221; button_text_color__hover=&#8221;#000000&#8243; sticky_transition=&#8221;on&#8221;]<h1 class=\"p1\"><span class=\"s1\">INVESTIGATIONS<\/span><\/h1>\n<p class=\"p1\"><span class=\"s1\">Corporate security, criminal investigations, defensive vulnerability assessments<\/span><\/p>[\/et_pb_slide][et_pb_slide button_text=&#8221;LEARN MORE&#8221; button_link=&#8221;#TESTING&#8221; use_bg_overlay=&#8221;off&#8221; use_text_overlay=&#8221;off&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h5&#8243; header_font=&#8221;Abel||||||||&#8221; header_font_size=&#8221;66px&#8221; header_letter_spacing=&#8221;12px&#8221; body_font=&#8221;Abel||||||||&#8221; body_font_size=&#8221;20px&#8221; body_line_height=&#8221;1em&#8221; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/northcyber.com\/wp-content\/uploads\/2025\/01\/background_red.jpg&#8221; background_enable_image=&#8221;on&#8221; background_position=&#8221;bottom_center&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;22px&#8221; button_border_radius=&#8221;100px&#8221; button_font=&#8221;Abel||||||||&#8221; button_use_icon=&#8221;off&#8221; button_custom_padding=&#8221;|40px||40px|false|true&#8221; button_custom_padding_tablet=&#8221;|38px||38px|false|true&#8221; button_custom_padding_phone=&#8221;|25px||25px|false|true&#8221; button_custom_padding_last_edited=&#8221;on|desktop&#8221; text_orientation=&#8221;left&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; header_font_size_tablet=&#8221;50px&#8221; header_font_size_phone=&#8221;32px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; body_font_size_tablet=&#8221;25px&#8221; body_font_size_phone=&#8221;18px&#8221; body_font_size_last_edited=&#8221;on|phone&#8221; button_text_size_tablet=&#8221;21px&#8221; button_text_size_phone=&#8221;17px&#8221; button_text_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; button_bg_color__hover_enabled=&#8221;on|desktop&#8221; button_bg_color__hover=&#8221;#FFFFFF&#8221; button_bg_enable_color__hover=&#8221;on&#8221; button_text_color__hover_enabled=&#8221;on|hover&#8221; button_text_color__hover=&#8221;#000000&#8243; sticky_transition=&#8221;on&#8221;]<h1 class=\"p1\"><span class=\"s1\">PENETRATION TESTING<\/span><\/h1>\n<p class=\"p1\"><span class=\"s1\">Technical penetration, social engineering, physical incursion<\/span><\/p>[\/et_pb_slide][et_pb_slide button_text=&#8221;LEARN MORE&#8221; button_link=&#8221;#TRAINING&#8221; use_bg_overlay=&#8221;off&#8221; use_text_overlay=&#8221;off&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h5&#8243; header_font=&#8221;Abel||||||||&#8221; header_font_size=&#8221;66px&#8221; header_letter_spacing=&#8221;12px&#8221; body_font=&#8221;Abel||||||||&#8221; body_font_size=&#8221;20px&#8221; body_line_height=&#8221;1em&#8221; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/northcyber.com\/wp-content\/uploads\/2025\/01\/background_pink-blue.jpg&#8221; background_enable_image=&#8221;on&#8221; background_position=&#8221;bottom_center&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;22px&#8221; button_border_radius=&#8221;100px&#8221; button_font=&#8221;Abel||||||||&#8221; button_use_icon=&#8221;off&#8221; button_custom_padding=&#8221;|40px||40px|false|true&#8221; button_custom_padding_tablet=&#8221;|38px||38px|false|true&#8221; button_custom_padding_phone=&#8221;|25px||25px|false|true&#8221; button_custom_padding_last_edited=&#8221;on|desktop&#8221; text_orientation=&#8221;left&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; header_font_size_tablet=&#8221;50px&#8221; header_font_size_phone=&#8221;32px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; body_font_size_tablet=&#8221;25px&#8221; body_font_size_phone=&#8221;18px&#8221; body_font_size_last_edited=&#8221;on|phone&#8221; button_text_size_tablet=&#8221;21px&#8221; button_text_size_phone=&#8221;17px&#8221; button_text_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; button_bg_color__hover_enabled=&#8221;on|desktop&#8221; button_bg_color__hover=&#8221;#FFFFFF&#8221; button_bg_enable_color__hover=&#8221;on&#8221; button_text_color__hover_enabled=&#8221;on|hover&#8221; button_text_color__hover=&#8221;#000000&#8243; sticky_transition=&#8221;on&#8221;]<h1 class=\"p1\"><span class=\"s1\">TRAINING<\/span><\/h1>\n<p class=\"p1\"><span class=\"s1\">OSINT research, privacy awareness and management, social engineering skills<\/span><\/p>[\/et_pb_slide][et_pb_slide button_text=&#8221;LEARN MORE&#8221; button_link=&#8221;#CONSULTATION&#8221; use_bg_overlay=&#8221;off&#8221; use_text_overlay=&#8221;off&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h5&#8243; header_font=&#8221;Abel||||||||&#8221; header_font_size=&#8221;66px&#8221; header_letter_spacing=&#8221;12px&#8221; body_font=&#8221;Abel||||||||&#8221; body_font_size=&#8221;20px&#8221; body_line_height=&#8221;1em&#8221; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/northcyber.com\/wp-content\/uploads\/2025\/01\/background_green.jpg&#8221; background_enable_image=&#8221;on&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;22px&#8221; button_border_radius=&#8221;100px&#8221; button_font=&#8221;Abel||||||||&#8221; button_use_icon=&#8221;off&#8221; button_custom_padding=&#8221;|40px||40px|false|true&#8221; button_custom_padding_tablet=&#8221;|38px||38px|false|true&#8221; button_custom_padding_phone=&#8221;|25px||25px|false|true&#8221; button_custom_padding_last_edited=&#8221;on|desktop&#8221; text_orientation=&#8221;left&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; header_font_size_tablet=&#8221;50px&#8221; header_font_size_phone=&#8221;32px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; body_font_size_tablet=&#8221;25px&#8221; body_font_size_phone=&#8221;18px&#8221; body_font_size_last_edited=&#8221;on|phone&#8221; button_text_size_tablet=&#8221;21px&#8221; button_text_size_phone=&#8221;17px&#8221; button_text_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; button_bg_color__hover_enabled=&#8221;on|desktop&#8221; button_bg_color__hover=&#8221;#FFFFFF&#8221; button_bg_enable_color__hover=&#8221;on&#8221; button_text_color__hover_enabled=&#8221;on|hover&#8221; button_text_color__hover=&#8221;#000000&#8243; sticky_transition=&#8221;on&#8221;]<h1 class=\"p1\"><span class=\"s1\">CONSULTATION<\/span><\/h1>\n<p class=\"p1\"><span class=\"s1\">One-on-one advice, whole organisation reviews, crisis response (CIRP)<\/span><\/p>[\/et_pb_slide][\/et_pb_fullwidth_slider][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/northcyber.com\/wp-content\/uploads\/2025\/01\/background_main.jpg&#8221; background_position=&#8221;bottom_center&#8221; custom_padding=&#8221;0px||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;1600px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/northcyber.com\/wp-content\/uploads\/2025\/01\/Logo-icons.png&#8221; title_text=&#8221;Logo-icons&#8221; align=&#8221;right&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;19%&#8221; width_tablet=&#8221;41%&#8221; width_phone=&#8221;61%&#8221; width_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;0px|20px|0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_id=&#8221;WWD&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/northcyber.com\/wp-content\/uploads\/2025\/01\/background_black.jpg&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Abel||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;35px&#8221; text_line_height=&#8221;1em&#8221; header_font=&#8221;Abel|700|||||||&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;70px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Abel|700|||||||&#8221; header_2_text_align=&#8221;right&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; header_2_font_size=&#8221;70px&#8221; custom_margin=&#8221;200px||200px||true|false&#8221; custom_margin_tablet=&#8221;80px||80px||true|false&#8221; custom_margin_phone=&#8221;80px||80px||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; text_font_size_tablet=&#8221;35px&#8221; text_font_size_phone=&#8221;20px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;70px&#8221; header_font_size_phone=&#8221;38px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;70px&#8221; header_2_font_size_phone=&#8221;38px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<h2 class=\"p1\"><span class=\"s1\">WHAT WE DO<\/span><\/h2>\n<p><span class=\"s1\"><\/span><\/p>\n<p><span class=\"s1\"><\/span><\/p>\n<p><span class=\"s1\"><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">North Cyber uses deep open source intelligence (OSINT) expertise to make you more secure.<\/span><span class=\"s1\"><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">We investigate threats to you or your organisation; test your defensive measures; advise you on your vulnerabilities and how you can mitigate them; and deliver on-site cyber training.<\/span><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_id=&#8221;INVESTIGATIONS&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/northcyber.com\/wp-content\/uploads\/2025\/01\/background_peach-blue.jpg&#8221; background_position=&#8221;top_right&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_3,2_3&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/northcyber.com\/wp-content\/uploads\/2025\/01\/image_Investigation.png&#8221; alt=&#8221;Investigation&#8221; title_text=&#8221;image_Investigation&#8221; show_bottom_space=&#8221;off&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; width_tablet=&#8221;48%&#8221; width_phone=&#8221;50%&#8221; width_last_edited=&#8221;on|phone&#8221; max_width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; custom_padding=&#8221;160px||||false|false&#8221; custom_padding_tablet=&#8221;20px||||false|false&#8221; custom_padding_phone=&#8221;20px||||false|false&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Abel||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;35px&#8221; text_line_height=&#8221;1em&#8221; header_font=&#8221;Abel|700|||||||&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;70px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Abel|700|||||||&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; header_2_font_size=&#8221;70px&#8221; custom_margin=&#8221;200px||30px||false|false&#8221; custom_margin_tablet=&#8221;0px||0px||true|false&#8221; custom_margin_phone=&#8221;-18px||0px||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; text_font_size_tablet=&#8221;35px&#8221; text_font_size_phone=&#8221;20px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;70px&#8221; header_font_size_phone=&#8221;38px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;70px&#8221; header_2_font_size_phone=&#8221;38px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; text_orientation_tablet=&#8221;center&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<h2 class=\"p1\"><span class=\"s1\">INVESTIGATIONS<\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">Corporate security<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Criminal investigations<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Defensive vulnerability assessments<\/span><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Abel||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;28px&#8221; text_line_height=&#8221;1em&#8221; header_font=&#8221;Abel|700|||||||&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;70px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Abel|700|||||||&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; header_2_font_size=&#8221;70px&#8221; custom_margin=&#8221;0px||200px||false|false&#8221; custom_margin_tablet=&#8221;30px||80px||false|false&#8221; custom_margin_phone=&#8221;30px||80px||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;20px||||false|false&#8221; custom_padding_tablet=&#8221;20px||||false|false&#8221; custom_padding_phone=&#8221;0px||||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; text_font_size_tablet=&#8221;28px&#8221; text_font_size_phone=&#8221;20px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_font_size_tablet=&#8221;70px&#8221; header_font_size_phone=&#8221;38px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;70px&#8221; header_2_font_size_phone=&#8221;38px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; text_orientation_tablet=&#8221;&#8221; text_orientation_phone=&#8221;&#8221; text_orientation_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<p class=\"p1\"><span class=\"s1\">Specialising in OSINT, we perform a wide range of investigations for individuals and organisations. Much of our work is defensive in nature &#8211; finding the vulnerabilities before the bad guy does.<\/span><\/p>\n<p class=\"p1\"><strong><span class=\"s1\">Corporate<span class=\"Apple-converted-space\">\u00a0 <\/span><\/span><\/strong><span class=\"s2\">\u2014 <span class=\"Apple-converted-space\">\u00a0 <\/span>intellectual property theft, malicious insiders, business intelligence<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><strong>Criminal<\/strong> <span class=\"Apple-converted-space\">\u00a0 \u00a0 <\/span><\/span><span class=\"s2\">\u2014 <span class=\"Apple-converted-space\">\u00a0 <\/span>fraud, scams, threats, crypto investigation<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><strong>Defensive<\/strong><span class=\"Apple-converted-space\">\u00a0 <\/span><\/span><span class=\"s2\">\u2014 <span class=\"Apple-converted-space\">\u00a0 <\/span>board member exposure, HNW vulnerability, family risk<\/span><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_id=&#8221;TESTING&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/northcyber.com\/wp-content\/uploads\/2025\/01\/background_red.jpg&#8221; background_position=&#8221;top_right&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_3,2_3&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/northcyber.com\/wp-content\/uploads\/2025\/01\/image_Penetration.png&#8221; alt=&#8221;PENETRATION TESTING&#8221; title_text=&#8221;image_Penetration&#8221; show_bottom_space=&#8221;off&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; width_tablet=&#8221;48%&#8221; width_phone=&#8221;50%&#8221; width_last_edited=&#8221;on|phone&#8221; max_width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; custom_padding=&#8221;160px||||false|false&#8221; custom_padding_tablet=&#8221;20px||||false|false&#8221; custom_padding_phone=&#8221;20px||||false|false&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Abel||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;35px&#8221; text_line_height=&#8221;1em&#8221; header_font=&#8221;Abel|700|||||||&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;70px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Abel|700|||||||&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; header_2_font_size=&#8221;70px&#8221; custom_margin=&#8221;200px||30px||false|false&#8221; custom_margin_tablet=&#8221;0px||0px||true|false&#8221; custom_margin_phone=&#8221;-18px||0px||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; text_font_size_tablet=&#8221;35px&#8221; text_font_size_phone=&#8221;20px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;70px&#8221; header_font_size_phone=&#8221;38px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;70px&#8221; header_2_font_size_phone=&#8221;38px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; text_orientation_tablet=&#8221;center&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<h2 class=\"p1\"><span class=\"s1\">PENETRATION TESTING<\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">Technical penetration<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Social engineering<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Physical incursion<\/span><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Abel||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;28px&#8221; text_line_height=&#8221;1em&#8221; header_font=&#8221;Abel|700|||||||&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;70px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Abel|700|||||||&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; header_2_font_size=&#8221;70px&#8221; custom_margin=&#8221;0px||200px||false|false&#8221; custom_margin_tablet=&#8221;30px||80px||false|false&#8221; custom_margin_phone=&#8221;30px||80px||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;20px||||false|false&#8221; custom_padding_tablet=&#8221;20px||||false|false&#8221; custom_padding_phone=&#8221;0px||||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; text_font_size_tablet=&#8221;28px&#8221; text_font_size_phone=&#8221;20px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_font_size_tablet=&#8221;70px&#8221; header_font_size_phone=&#8221;38px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;70px&#8221; header_2_font_size_phone=&#8221;38px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; text_orientation_tablet=&#8221;&#8221; text_orientation_phone=&#8221;&#8221; text_orientation_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<p class=\"p1\"><span class=\"s1\">With our background in government operations, we are uniquely placed to simulate how a hostile party will try to penetrate your organisation. We usually work from a start point of zero privileged information, for maximum realism.<\/span><\/p>\n<p class=\"p3\"><strong><span class=\"s1\">Our real strength is in combining multiple skill-sets into a single \u201cRed Team\u201d, acting as the bad guys do to penetrate an organisation, then reporting in detail how to strengthen your defences.<\/span><\/strong><\/p>\n<p class=\"p1\"><span class=\"s1\">The <\/span><strong><span class=\"s2\">scope<\/span><\/strong><span class=\"s1\"> can be<\/span><span class=\"s2\"> <\/span><span class=\"s1\">as narrow or as wide as you need, from web app testing to full simulated attack.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Our <\/span><strong><span class=\"s2\">activity <\/span><\/strong><span class=\"s1\">can simply be<\/span><span class=\"s2\"> <\/span><span class=\"s1\">passive reporting on what vulnerabilities we find, or \u201ctrigger pull\u201d active tests.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Our team holds <\/span><strong><span class=\"s2\">accreditations<\/span><\/strong><span class=\"s1\"> from OffSec, The Cyber Scheme, CHECK and CREST.<\/span><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_id=&#8221;CONSULTATION&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/northcyber.com\/wp-content\/uploads\/2025\/01\/background_green.jpg&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_3,2_3&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/northcyber.com\/wp-content\/uploads\/2025\/01\/image_Consultation.png&#8221; alt=&#8221;CONSULTATION&#8221; title_text=&#8221;image_Consultation&#8221; show_bottom_space=&#8221;off&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; width_tablet=&#8221;48%&#8221; width_phone=&#8221;50%&#8221; width_last_edited=&#8221;on|phone&#8221; max_width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; custom_padding=&#8221;160px||||false|false&#8221; custom_padding_tablet=&#8221;20px||||false|false&#8221; custom_padding_phone=&#8221;20px||||false|false&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Abel||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;35px&#8221; text_line_height=&#8221;1em&#8221; header_font=&#8221;Abel|700|||||||&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;70px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Abel|700|||||||&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; header_2_font_size=&#8221;70px&#8221; custom_margin=&#8221;200px||30px||false|false&#8221; custom_margin_tablet=&#8221;0px||0px||true|false&#8221; custom_margin_phone=&#8221;-18px||0px||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; text_font_size_tablet=&#8221;35px&#8221; text_font_size_phone=&#8221;20px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;70px&#8221; header_font_size_phone=&#8221;38px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;70px&#8221; header_2_font_size_phone=&#8221;38px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; text_orientation_tablet=&#8221;center&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<h2 class=\"p1\"><span class=\"s1\">CONSULTATION<\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">One-on-one advice<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Whole-organisation reviews<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Crisis response and preparation<\/span><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Abel||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;28px&#8221; text_line_height=&#8221;1em&#8221; header_font=&#8221;Abel|700|||||||&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;70px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Abel|700|||||||&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; header_2_font_size=&#8221;70px&#8221; custom_margin=&#8221;0px||200px||false|false&#8221; custom_margin_tablet=&#8221;30px||80px||false|false&#8221; custom_margin_phone=&#8221;30px||80px||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;20px||||false|false&#8221; custom_padding_tablet=&#8221;20px||||false|false&#8221; custom_padding_phone=&#8221;0px||||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; text_font_size_tablet=&#8221;28px&#8221; text_font_size_phone=&#8221;20px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_font_size_tablet=&#8221;70px&#8221; header_font_size_phone=&#8221;38px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;70px&#8221; header_2_font_size_phone=&#8221;38px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; text_orientation_tablet=&#8221;&#8221; text_orientation_phone=&#8221;&#8221; text_orientation_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<p class=\"p1\"><strong><span class=\"s1\">We provide advice and reviews on any aspect of your online security, from one-on-one advice to individuals to whole-organisation information security reviews.<\/span><\/strong><span class=\"s1\"><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">We also deliver crisis response for cyber incidents, and can assist in the development of a<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Cyber Incident Response Plan (CIRP) to prepare your organisation <\/span><strong><span class=\"s2\">before<\/span><\/strong><span class=\"s1\"> the worst happens.<\/span><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_id=&#8221;TRAINING&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/northcyber.com\/wp-content\/uploads\/2025\/01\/background_pink-blue.jpg&#8221; background_position=&#8221;top_right&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_3,2_3&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/northcyber.com\/wp-content\/uploads\/2025\/01\/image_Training.png&#8221; alt=&#8221;TRAINING&#8221; title_text=&#8221;image_Training&#8221; show_bottom_space=&#8221;off&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; width_tablet=&#8221;48%&#8221; width_phone=&#8221;50%&#8221; width_last_edited=&#8221;on|phone&#8221; max_width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; custom_padding=&#8221;160px||||false|false&#8221; custom_padding_tablet=&#8221;20px||||false|false&#8221; custom_padding_phone=&#8221;20px||||false|false&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Abel||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;35px&#8221; text_line_height=&#8221;1em&#8221; header_font=&#8221;Abel|700|||||||&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;70px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Abel|700|||||||&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; header_2_font_size=&#8221;70px&#8221; custom_margin=&#8221;200px||30px||false|false&#8221; custom_margin_tablet=&#8221;0px||0px||true|false&#8221; custom_margin_phone=&#8221;-18px||0px||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; text_font_size_tablet=&#8221;35px&#8221; text_font_size_phone=&#8221;20px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;70px&#8221; header_font_size_phone=&#8221;38px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;70px&#8221; header_2_font_size_phone=&#8221;38px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; text_orientation_tablet=&#8221;center&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<h2 class=\"p1\"><span class=\"s1\">TRAINING<\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">OSINT research<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Privacy awareness and management<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Social engineering skills<\/span><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Abel||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;28px&#8221; text_line_height=&#8221;1em&#8221; header_font=&#8221;Abel|700|||||||&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;70px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Abel|700|||||||&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; header_2_font_size=&#8221;70px&#8221; custom_margin=&#8221;0px||200px||false|false&#8221; custom_margin_tablet=&#8221;30px||80px||false|false&#8221; custom_margin_phone=&#8221;30px||80px||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;20px||||false|false&#8221; custom_padding_tablet=&#8221;20px||||false|false&#8221; custom_padding_phone=&#8221;0px||||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; text_font_size_tablet=&#8221;28px&#8221; text_font_size_phone=&#8221;20px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_font_size_tablet=&#8221;70px&#8221; header_font_size_phone=&#8221;38px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;70px&#8221; header_2_font_size_phone=&#8221;38px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; text_orientation_tablet=&#8221;&#8221; text_orientation_phone=&#8221;&#8221; text_orientation_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<p class=\"p1\"><strong><span class=\"s1\">Our team is comprised of seasoned professionals who are both experienced trainers and busy practitioners.<\/span><\/strong><\/p>\n<p class=\"p1\"><strong><span class=\"s1\">We offer training based on our real-world experience, tailored to your specific requirements.<\/span><\/strong><\/p>\n<p class=\"p3\"><span class=\"s1\">Our primary offerings are in the areas of:<\/span><\/p>\n<p class=\"p3\"><span class=\"s2\"><strong>Research<\/strong><span class=\"Apple-converted-space\">\u00a0 <\/span><\/span><span class=\"s1\">\u2014 <span class=\"Apple-converted-space\">\u00a0 <\/span>comprehensive OSINT training delivered by experienced practitioners<\/span><\/p>\n<p class=\"p3\"><span class=\"s2\"><strong>Privacy<\/strong><span class=\"Apple-converted-space\">\u00a0 \u00a0 \u00a0 <\/span><\/span><span class=\"s1\">\u2014 <span class=\"Apple-converted-space\">\u00a0 <\/span>awareness of your digital footprint, and how to reduce your attack surface<\/span><\/p>\n<p class=\"p3\"><span class=\"s2\"><strong>SE skills<\/strong><span class=\"Apple-converted-space\"><strong>\u00a0<\/strong> \u00a0 <\/span><\/span><span class=\"s1\">\u2014 <span class=\"Apple-converted-space\">\u00a0 <\/span>for governmental clients only, how to leverage psychology online<\/span><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_id=&#8221;WWA&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/northcyber.com\/wp-content\/uploads\/2025\/01\/background_purple.jpg&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Abel||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;35px&#8221; text_line_height=&#8221;1em&#8221; header_font=&#8221;Abel|700|||||||&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;70px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Abel|700|||||||&#8221; header_2_text_align=&#8221;right&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; header_2_font_size=&#8221;70px&#8221; custom_margin=&#8221;200px||200px||true|false&#8221; custom_margin_tablet=&#8221;80px||80px||true|false&#8221; custom_margin_phone=&#8221;80px||80px||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; text_font_size_tablet=&#8221;35px&#8221; text_font_size_phone=&#8221;20px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;70px&#8221; header_font_size_phone=&#8221;38px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;70px&#8221; header_2_font_size_phone=&#8221;38px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<h2 class=\"p1\"><span class=\"s1\">WHO WE ARE<\/span><\/h2>\n<p><span class=\"s1\"><\/span><\/p>\n<p><span class=\"s1\"><\/span><\/p>\n<p><span class=\"s1\"><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">North Cyber utilises staff drawn exclusively from governmental backgrounds, with a range of specialist and niche abilities that can be drawn upon for any given task.<\/span><span class=\"s1\"><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Collectively, we have many decades of experience at the cutting edge of investigations and cyber operations. Our testers are accredited by OffSec, The Cyber Scheme, CHECK and CREST.<\/span><span class=\"s1\"><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Our unique strength lies in our ability to combine the technical and the human aspects of cyber security.<\/span><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_id=&#8221;WWO&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/northcyber.com\/wp-content\/uploads\/2025\/01\/background_blue.jpg&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Abel||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;35px&#8221; text_line_height=&#8221;1em&#8221; header_font=&#8221;Abel|700|||||||&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;70px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Abel|700|||||||&#8221; header_2_text_align=&#8221;right&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; header_2_font_size=&#8221;70px&#8221; custom_margin=&#8221;200px||200px||true|false&#8221; custom_margin_tablet=&#8221;80px||80px||true|false&#8221; custom_margin_phone=&#8221;80px||80px||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; text_font_size_tablet=&#8221;35px&#8221; text_font_size_phone=&#8221;20px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;70px&#8221; header_font_size_phone=&#8221;38px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;70px&#8221; header_2_font_size_phone=&#8221;38px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<h2 class=\"p1\"><span class=\"s1\">WHERE WE OPERATE<\/span><\/h2>\n<p><span class=\"s1\"><\/span><\/p>\n<p><span class=\"s1\"><\/span><\/p>\n<p><span class=\"s1\"><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">We are a company with genuine <\/span><strong><span class=\"s2\">global<\/span><\/strong><span class=\"s1\"> reach.<\/span><span class=\"s1\"><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Our previous engagements have involved clients in Europe, the Americas, the Caribbean, the Middle East, Sub-Saharan Africa, East Asia, Australasia, and Oceania.<\/span><span class=\"s1\"><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">If you have a requirement, please get in touch.<\/span><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/northcyber.com\/wp-content\/uploads\/2025\/01\/background_black.jpg&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Abel||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;35px&#8221; text_line_height=&#8221;1em&#8221; header_font=&#8221;Abel|700|||||||&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;70px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;Abel|700|||||||&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; header_2_font_size=&#8221;70px&#8221; custom_margin=&#8221;200px||200px||true|false&#8221; custom_margin_tablet=&#8221;80px||80px||true|false&#8221; custom_margin_phone=&#8221;80px||80px||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; text_font_size_tablet=&#8221;35px&#8221; text_font_size_phone=&#8221;20px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;70px&#8221; header_font_size_phone=&#8221;38px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;70px&#8221; header_2_font_size_phone=&#8221;38px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<h2 class=\"p1\"><span class=\"s1\">CONTACT<\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/northcyber.com\/wp-content\/uploads\/2025\/01\/logo_Wire.png\" width=\"37\" height=\"37\" alt=\"\" class=\"wp-image-580 alignnone size-medium\" srcset=\"https:\/\/northcyber.com\/wp-content\/uploads\/2025\/01\/logo_Wire.png 280w, https:\/\/northcyber.com\/wp-content\/uploads\/2025\/01\/logo_Wire-150x150.png 150w\" sizes=\"auto, (max-width: 37px) 100vw, 37px\" \/>\u00a0\u00a0<\/span><span class=\"s1\">Wire secure messenger:<\/span><strong><span class=\"s2\"> ncyber<\/span><\/strong><\/p>\n<p class=\"p1\"><span class=\"s1\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/northcyber.com\/wp-content\/uploads\/2025\/01\/logo_email-300x190.png\" width=\"35\" height=\"22\" alt=\"\" class=\"wp-image-579 alignnone size-medium\" \/>\u00a0 \u00a0<\/span><span class=\"s1\">Email: <\/span><strong><span class=\"s2\">query [at] northcyber.com<\/span><\/strong><\/p>\n<p class=\"p1\"><span class=\"s1\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/northcyber.com\/wp-content\/uploads\/2025\/01\/logo_Proton.png\" width=\"24\" height=\"30\" alt=\"\" class=\"wp-image-581 alignnone size-medium\" \/>\u00a0 \u00a0 All of North Cyber\u2019s email communications are handled by <\/span><strong><span class=\"s2\">Protonmail<\/span><\/strong><span class=\"s1\">.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">As security professionals, your privacy is important to us. Contact us from a Protonmail address if you wish to initiate a conversation that is end-to-end encrypted from the outset.<\/span><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n","protected":false},"excerpt":{"rendered":"<p>CYBER INTELLIGENCE North Cyber specialises in complex investigations and security testing. We provide investigative, testing, training and consultation services to individuals and organisations.INVESTIGATIONS Corporate security, criminal investigations, defensive vulnerability assessmentsPENETRATION TESTING Technical penetration, social engineering, physical incursionTRAINING OSINT research, privacy awareness and management, social engineering skillsCONSULTATION One-on-one advice, whole organisation reviews, crisis response (CIRP)WHAT WE [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":501,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-512","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Security - North Cyber<\/title>\n<meta name=\"description\" content=\"North Cyber - Specialising in OSINT, we perform a wide range of investigations for individuals and organisations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/northcyber.com\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security - North Cyber\" \/>\n<meta property=\"og:description\" content=\"North Cyber - Specialising in OSINT, we perform a wide range of investigations for individuals and organisations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/northcyber.com\/\" \/>\n<meta property=\"og:site_name\" content=\"North Cyber\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-05T20:03:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/northcyber.com\/wp-content\/uploads\/2023\/01\/Feature-Image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/northcyber.com\\\/\",\"url\":\"https:\\\/\\\/northcyber.com\\\/\",\"name\":\"Cyber Security - North Cyber\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/northcyber.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/northcyber.com\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/northcyber.com\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/northcyber.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Feature-Image.jpg\",\"datePublished\":\"2025-01-26T12:54:23+00:00\",\"dateModified\":\"2025-02-05T20:03:59+00:00\",\"description\":\"North Cyber - Specialising in OSINT, we perform a wide range of investigations for individuals and organisations.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/northcyber.com\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/northcyber.com\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/northcyber.com\\\/#primaryimage\",\"url\":\"https:\\\/\\\/northcyber.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Feature-Image.jpg\",\"contentUrl\":\"https:\\\/\\\/northcyber.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Feature-Image.jpg\",\"width\":1000,\"height\":500,\"caption\":\"North Cyber\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/northcyber.com\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/northcyber.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/northcyber.com\\\/#website\",\"url\":\"https:\\\/\\\/northcyber.com\\\/\",\"name\":\"North Cyber\",\"description\":\"North Cyber\",\"publisher\":{\"@id\":\"https:\\\/\\\/northcyber.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/northcyber.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/northcyber.com\\\/#organization\",\"name\":\"North Cyber\",\"url\":\"https:\\\/\\\/northcyber.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/northcyber.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/northcyber.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/northcyber-logo-dark.png\",\"contentUrl\":\"https:\\\/\\\/northcyber.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/northcyber-logo-dark.png\",\"width\":1134,\"height\":262,\"caption\":\"North Cyber\"},\"image\":{\"@id\":\"https:\\\/\\\/northcyber.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security - North Cyber","description":"North Cyber - Specialising in OSINT, we perform a wide range of investigations for individuals and organisations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/northcyber.com\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security - North Cyber","og_description":"North Cyber - Specialising in OSINT, we perform a wide range of investigations for individuals and organisations.","og_url":"https:\/\/northcyber.com\/","og_site_name":"North Cyber","article_modified_time":"2025-02-05T20:03:59+00:00","og_image":[{"width":1000,"height":500,"url":"https:\/\/northcyber.com\/wp-content\/uploads\/2023\/01\/Feature-Image.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/northcyber.com\/","url":"https:\/\/northcyber.com\/","name":"Cyber Security - North Cyber","isPartOf":{"@id":"https:\/\/northcyber.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/northcyber.com\/#primaryimage"},"image":{"@id":"https:\/\/northcyber.com\/#primaryimage"},"thumbnailUrl":"https:\/\/northcyber.com\/wp-content\/uploads\/2023\/01\/Feature-Image.jpg","datePublished":"2025-01-26T12:54:23+00:00","dateModified":"2025-02-05T20:03:59+00:00","description":"North Cyber - Specialising in OSINT, we perform a wide range of investigations for individuals and organisations.","breadcrumb":{"@id":"https:\/\/northcyber.com\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/northcyber.com\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/northcyber.com\/#primaryimage","url":"https:\/\/northcyber.com\/wp-content\/uploads\/2023\/01\/Feature-Image.jpg","contentUrl":"https:\/\/northcyber.com\/wp-content\/uploads\/2023\/01\/Feature-Image.jpg","width":1000,"height":500,"caption":"North Cyber"},{"@type":"BreadcrumbList","@id":"https:\/\/northcyber.com\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/northcyber.com\/"},{"@type":"ListItem","position":2,"name":"Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/northcyber.com\/#website","url":"https:\/\/northcyber.com\/","name":"North Cyber","description":"North Cyber","publisher":{"@id":"https:\/\/northcyber.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/northcyber.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/northcyber.com\/#organization","name":"North Cyber","url":"https:\/\/northcyber.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/northcyber.com\/#\/schema\/logo\/image\/","url":"https:\/\/northcyber.com\/wp-content\/uploads\/2023\/01\/northcyber-logo-dark.png","contentUrl":"https:\/\/northcyber.com\/wp-content\/uploads\/2023\/01\/northcyber-logo-dark.png","width":1134,"height":262,"caption":"North Cyber"},"image":{"@id":"https:\/\/northcyber.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/northcyber.com\/index.php\/wp-json\/wp\/v2\/pages\/512","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/northcyber.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/northcyber.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/northcyber.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/northcyber.com\/index.php\/wp-json\/wp\/v2\/comments?post=512"}],"version-history":[{"count":41,"href":"https:\/\/northcyber.com\/index.php\/wp-json\/wp\/v2\/pages\/512\/revisions"}],"predecessor-version":[{"id":621,"href":"https:\/\/northcyber.com\/index.php\/wp-json\/wp\/v2\/pages\/512\/revisions\/621"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/northcyber.com\/index.php\/wp-json\/wp\/v2\/media\/501"}],"wp:attachment":[{"href":"https:\/\/northcyber.com\/index.php\/wp-json\/wp\/v2\/media?parent=512"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}