background

KCS Information Services

Bringing a unique perspective to cyber security and cyber risk, providing strategic intelligence and analysis on a global scale.

The last decade has seen a dramatic shift in the cyber threat landscape. No longer is the primary threat a teenage ‘script kiddie’ looking for bragging rights. Today’s attackers are more often State Sponsored Groups (SSG’s) or Organised Criminal Gangs (OCG’s). With this shift, there has been a dramatic increase in well written and effective ‘Hacker Toolkits’ that can be run with minimal expertise.

The speed of this change has left many still believing the old mindset that their company is not worth the trouble to hack. This may have been true when a quick website defacement was all that was desired, however in today’s world SSG’s and OCG’s have a longer strategic view.

They know that every company has something worth taking whether it be your customer database to use for identity theft, abuse of your partner relationships to make you the weak link in their security or even just turning your infrastructure into a network to target others, eg, Botnets.

Old school defences are no longer effective and too many companies still cling to the old received wisdom of ‘build you walls high and hope for the best’. With attackers rapidly evolving their tools and techniques you can no longer ‘set and forget’ your security.

To protect your infrastructure, assets, and the reputation of your company to combat these emerging threats and continue to trade successfully in the 21st century digital arena, your security needs to evolve in parallel.

KCS can bring a unique perspective to cyber security due to its decades of experience in providing strategic intelligence and risk analysis on a global scale. Combining this with our expertise in Cyber Security and Cyber risk, as well as our ability to maintain a presence within the Dark Web, enables us to provide you with unparalleled threat intelligence, analysis and contingency plans and implementation.

This will give you a firm footing from which to build your security and protect your business.

 

 

Services

 

Penetration Testing

KCS can perform full penetration tests/ethical hacks against many different systems. These can either be ‘White Box testing’, when the Penetration Tester (Pen Tester) has full knowledge of all systems and can rigorously test the internal structure and workings of applications and systems, or, ‘Black Box testing’ where the Pen Tester tests the functionality of an application or system with no internal knowledge of systems, i.e. looking through the eyes of a hacker.

Infrastructure Pen Test

This attempts to breach the company’s critical infrastructure

Industrial Control System (ICS) Pen Test

For companies running large industrial machinery such as Supervisory control and data acquisition (SCADA) controlled manufacturing plants

Social Engineering and Phishing Audits

It is often said that humans are the biggest security weakness in any company. Employees of most companies have little or no training in how to spot fraudulent emails and many act on requests apparently coming from senior company officials without question. KCS can carry out realistic Phishing and Social Engineering attacks and provide training on how to spot suspicious activity helping raise security awareness to your staff.

Wireless Network Assessment

Wireless networks present an invisible and often overlooked attack route into the core of an organisation with attackers able to breach your systems without ever setting foot in your offices. KCS can carry out an assessment of the security of this vital component.

Web Application Pen Test (OWASP Top 10)

Many companies maintain a large web presence that is not just their official web site. Other internal applications and client portals can provide a backdoor for determined attackers. KCS can test your application against the Open Web Application Security Project (OWASP) top 10 vulnerabilities to give you some assurance that vulnerable applications are not sitting on your perimeter [is there a better way to say perimeter].

 

Vulnerability Assessments

Vulnerability assessments are carried out with no attempt made to exploit the vulnerabilities detected.

External Non-Intrusive Vulnerability Assessment

KCS can probe the exterior of you network in a non-intrusive manor and advise of any issues.

Internal Vulnerability Assessment

Many people make the mistake of only strengthening their perimeter allowing an attacker to compromise machines with ease once they are inside. KCS can provide a more comprehensive assessment that runs from inside you network allowing you to verify that your internal servers are patched and secured.

Social Media Vulnerability Assessment

KCS can consider the amount of data leakage onto social media, both from your official company sources and your employees. This helps you verify that your employees are adhering to your company’s social media policy.

 

Intelligence Gathering

Open Source Intelligence Report

Most companies don’t realise how much information regarding their business is freely available on sites. Attackers use this information to target organisations and craft social engineering campaigns. This report can help you spot potential attack routes and close them off before they are exploited.

Egeria Dark Web monitoring

The Dark Web is an unknown quantity to most companies and accessing private forums that hackers frequent is beyond their means. KCS have an extensive network in the Dark Web and can provide strategic intelligence on threats to your company.

 

Cyber Security Audits

Infrastructure Cyber Security Risk Audit

KCS can assess your current security layout and procedures against industry standards. Once completed we can help advise you on actions to mitigate any issues found.

Active Directory Security Health Check

Active Directory is a core component of many businesses critical infrastructure, but it is rarely strictly controlled, as this has generally grown organically with the company. Based on our years of experience KCS can perform a security health check and identify common misconfigurations and problems that could provide a breach point for attackers.

Cyber Security Policy Writing

Many companies lack experienced security professionals to aid them in creating the security policies that are required as part of their due diligence. KCS can assist you with writing your core security policies, taking your decision makers through the critical decision points, and documenting the results in the appropriate format.

  • “KCS's expertise is evident in everything it does which is why our relationship with the business continues to go from strength to strength.”
    Mike Jones
    Editor, StrategicRISK
  • “A reliable provider of impeccable and game-changing intelligence services.”
    Ulf Henriksson
    Transformation Leader, Dematic
  • “Dentons and KCS have a long history of working together and we are proud to have them as strategic risk intelligence partners.”
    Andrew Cheung
    General Counsel, Dentons
  • “I consider KCS to be a vital partner in making our Eastern European ventures so successful.”
    Anthony Gajadharsingh

We'll help you gain strategic insight into your market and competitors