Licensed as an investigative entity since 1984, CyberTech Security has always been on the leading edge of cyber related security and investigative trends. Having a broad range of technical exposure, from mainframes to mobile devices, we can address virtually any cyber related security or investigative issue.
Cyber related security incidents are not exclusively technical. Very often, there is some direct or indirect human factor involved. We have the background and understanding to appropriately consider and integrate these considerations with our cyber security services.
Whether you're a large company or an individual, reputation and public image are vital factors that need to be protected. The personal or business impact from a cyber security related incident can be very damaging. Unfortunately, this is especially true for someone who has a "high profile," such as executives, politicians, or media personalities. We understand the essential need for confidentiality and discretion. Reaching out to us early in an incident can help with damage control and choosing an appropriate course of action.
Despite best efforts, it really is only a matter of time before some type of cyber security incident will occur. When that happens, there may be many reasons to require forensic analysis of a computer or device. These situations can be personal, civil, criminal, corporate, or political - but they all require a need to know: what happened, when, how, and who did it. Gathering these details needs to be performed using solid evidentiary methods. CyberTech meets these requirements by offering basic and advanced forensic analysis including JTAG (off chip) services.
It is frequently important to identify how some type of malware code works, identify characteristics in order to develop signatures, or troubleshoot a security vulnerability in application software. It may also be useful to analyze software in order to find out who created the code - determining attribution. CyberTech can work with x86-64, ARM, Linux platforms, SCADA, and some embedded systems. We also participate in bug hunting services.
Ultimately, almost all data ends-up being in transit - moving from one point to another. Frequently, information is most vulnerable to exposure during this time. This is complicated by the proliferation of wireless networks, Bluetooth, RFID, and NFC types of communications. CyberTech offers packet capture analysis, wireless heat mapping and footprinting, and preventative services to ensure that wired and wireless networks are properly secured and hardened against eavesdropping or attack.
Ransomware represents a no win situation. First, there is the loss of access to your data. Second, there is often intimidation associated with the release of your data to the public. When an attack occurs, options may exist rather than paying the ransom. Options are important, especially because paying the ransom often ends up with a re-targeting and ransom fees go up significantly. Although it takes time, it may be possible to reverse engineer a ransomware attack and find a way to free-up the data. It may also be possible to perform attribution, identifying the attacker allowing for a counter-offensive to destroy the data the bad actors have retained.
No matter how much time, money, attention, or safeguards are put in place on the technical side to keep bad actors out - cyber incidents still happen. The weakest link in many organizations is not on the technology side. Insider threats (people) can represent the most damaging aspect of a cyber incident. Insider threats, along with traditional physical security shortcomings, often circumvent all the effort put into securing data and systems. CyberTech is well versed in Insider Threat analysis, investigations, and physical security consultation.
CompTIA Security + CE
CompTIA Pentest + CE
CompTIA CySA+ CE
CompTIA Security Analytics Professional
CompTIA Network Security Professional
CompTIA Network Vulnerability Assessment Professional
GIAC Reverse Engineering Malware (GREM)
GIAC Certified Forensic Analyst (GCFA)
GIAC Certified Intrusion Analyst (GCIA)
GIAC Mobile Security Analyst (GMOB)
GIAC Penetration Tester (GPEN)
GIAC Certified Forensic Examiner (GCFE)
GIAC Certified Incident Handler (GCIH)
European Council Certified Ethical Hacker (7)
InfoSec Institute - Penetration Tester
Cellebrite - Certified Physical Analyst
Cellebrite - Certified Logical Operator
ASIS - Certified Protection Professional
ASIS - Professional Certified Investigator
Army Signal Corps Regimental Association
American Society of Digital Forensics &eDiscovery
High Technology Crime Investigator's Association