Hire ethical hackers to check your online systems for vulnerabilities.

You think your company is not a target for hackers?

It probably is!

Criminals are targeting organisations of all sorts and sizes to steal information, disrupt operations, or extort money.

That’s why our ethical hackers use the same tools and tricks to test your IT infrastructure as the bad guys do, hopefully before the bad guys do…

Toreon’s Ivan Roels explains what a pentest is on Kanaal Z (Dutch)

Fill in our contact form and get in touch with our Ethical Hackers

4 + 0 = ?

Do you want to know more about what exactly a pentest is and what you can get checked?

Read a blog

,

Why the IT-OT Convergence is all about knowledge sharing

After attending the fifth Cyber and SCADA Security for Oil & Gas Industry conference, it became apparent lots of companies are having a hard time with the mingling of IT staff in the OT/ICS environments; the so-called IT-OT Convergence. My personal opinion is that the involvement of the IT people in OT environments is a…

, ,

Using ‘Embrace Cybersecurity’ to check on security progress

In a previous blog posts (Business and IT aligned with Cybersecurity and Baselining Cybersecurity), I introduced our ‘Embrace Cybersecurity’ (EC) model for gathering security requirements that can be used to create an information security policy. Using this method makes it easy to then also follow up on progress. We can do this by creating the…

, ,

Business and IT aligned with cybersecurity

The owner of information In today’s organisation, information is primarily managed and processed by IT. The IT department is very often also made responsible for securing the information in the systems that the business uses. Reports of recent cybersecurity incidents tell us this is definitely not right and recent legislations like the GDPR agree. A…