RANSOMWARE READINESS ASSESSMENT
The risk of a breach resulting in a ransomware incident has been steadily increasing in recent years. Ransomware actors have shown a willingness and ability to target organizations of all sizes.
Do you know how vulnerable your organization is to ransomware?
Are you prepared to respond if you are breached?
Will you know what steps to take after?
These are questions that you need answers to, and our team at Red Siege Information Security is prepared to do just that.
During the Ransomware Readiness Assessment, Red Siege will:
Step One: External Testing
- Test your external systems looking common entry points attackers look for.
Step Two: C2 Assessment
- Identify weakness in AV/EDR and Application Control Technologies.
- Find Limitations of endpoint protection in preventing execution of custom payloads.
Step Three: Assumed Breach
- Assess the business risk, should a host be compromised
- Test internal controls designed to contain a breach
Step Four: Encryption
- Identify deficiencies in detection capabilities of data-encrypting ransomware on end-user systems
- Provide guidance for remediation and mitigation verification
Security Starts Here
For this Ransomware Readiness Assessment, Red Siege uses a blended approach to analyze organizational ability to defend against a ransomware attack.
The test identifies gaps in perimeter defenses that may allow attackers to gain access to the organization and your data. Our testers identify assets that can be reached and modified by ransomware. After establishing a foothold on an internal host, Red Siege assesses an attacker’s ability to execute payloads on and exfiltrate data from a protected endpoint system modelling the tactics, techniques, and procedures (TTPs) of real threat actors.
At the conclusion of the engagement, Red Siege will provide a detailed report documenting any discovered weaknesses and deliver recommendations for resolving the issues, including methods for you to validate a fix has been properly implemented
CHECK OUT OUR
Assumed Breach Assessment
A small compromise can have big consequences. We start as a low privileged user and move through the network in an attempt to access the data that matters to you. This assessment simulates that of a compromised internal host/user or a rogue trusted insider. Assumed Breach more closely resembles the current threats than the traditional penetration test.
Red Team & Adversary Simulation
A goal-based assessment where we attack just like a real world adversary. This includes external attacks and targeted phishing to demonstrate the real risk to your data. We test your defenders (people) as well as the defenses (technology). Detection and response is a critical aspect of a well-rounded defense.
We enumerate your systems and services to identify vulnerabilities that put your organization at risk. Our goals are not technical wins, but goal focused around you, your data, and your processes. This is not a commodity penetration test, instead it is customized for your organization. We report on the issues that actually pose an actual risk to your organization.
Web Application Penetration Testing
An in-depth analysis of your web application and APIs to find security issues related to programming errors, misconfigurations, and application architectural issues. We will perform automated and manual runtime analysis of your application to identify more than just a scanner. Our testing includes custom test cases to fuzz your application and find the faults before the bad guys do.
This engagement is designed to test and train the Blue Team. We can work with or without an in-house Red Team. We’ll work with your defenders to document and measure in detection and response capabilities.
Mobile Application Assessment
We look at your mobile application and the associated infrastructure to find configuration weaknesses, server-side issues, insecure authentication and access control, and other issues related to the latest attacks on mobile applications.