Social Engineering

by Hannah Grace Holladay / May 16th, 2023

Social engineering leverages and manipulates human interactions to compromise your organization. This could be something like bypassing a procedure and letting a guest into…

Phishing

by Hannah Grace Holladay / May 16th, 2023

Phishing is any effort from an attacker to gain sensitive information from an individual via email, social media, and even phone calls. In the…

Network Pen Testing

by Hannah Grace Holladay / May 16th, 2023

Network penetration testing tests the strength of your network from the inside out.  This is accomplished in one of two methods: External network penetration…

DDoS

by Hannah Grace Holladay / May 16th, 2023

A Denial of Service (DoS) attack is a type of an external intrusion used by malicious hackers to shut down the web servers of…

Continuous Pen Testing

by Hannah Grace Holladay / May 16th, 2023

A standard penetration test is only a snapshot of what the security posture of your application or network had at the time of testing.…