Protect infrastructure and information from cyber attacks.

Cyber Defence is a computer network defence mechanism that includes action response, critical infrastructure protection and information assurance for organizations, government agencies, and other possible networks. Cyber Defence focuses on prevention, detection, and timely response to attacks or threats so that no infrastructure or information is tampered with. As the volume and complexity of cyber attacks increase, Cyber Defence is essential for most entities to protect sensitive information and assets.

With an understanding of the specific environment, Cyber Defence analyzes the various possible threats to the given environment. This helps in the development and implementation of the necessary strategies to counter malicious attacks or threats. For the protection of the affected entity and rapid response to a threat landscape, Cyber Defence encompasses a wide range of activities. These might include reducing the attractiveness of the environment to possible attackers, understanding critical locations and sensitive information, implementing preventive controls to ensure attacks are cost effective, attack detection capabilities, and response and response capabilities. Cyber Defence also performs technical analysis to identify pathways and areas that attackers might target.

Cyber Defence provides the assurance you need to manage processes and activities, without worrying about threats. It helps to improve the use of security strategies and resources in the most effective way. Cyber Defence also helps improve the effectiveness of security resources and expenditures, especially in critical locations.

Even though the abstract concept of architecture of a complex computing system has gradually expanded to include hardware, software, algorithms, communication infrastructures, platforms, data, processes, methodologies, contracts, human factors, etc., the protection of hardware remains absolutely inescapable. In fact, the hardware executes the software and is the last line of defence: if the hardware is corrupted, all the mechanisms introduced to secure the software (at any level) may be useless. A hardware not properly protected can be the weak link of the chain, becoming an access door to the system, to its functionalities and to the data treated and/or stored in it.

In order to analyze the vulnerabilities, the activities consist in a real simulation of a computer attack reproducing the modus operandi of an attacker. The activities are performed according to the OSSTMM (Open Source Security Testing Methodology Manual) and OWASP (Open Web Application Security Project) methodologies in Ethical Hacker mode and not through the use of automatic tools (Nessus Vulnerability Scanner); the automatic tool is used only in the very initial phases of the test.

In 95% of cases, a first analysis of the sites and domains shows that most of them are highly vulnerable to:

> external attacks aimed at physical and image damage;

> injection of malicious code;

> theft of databases, sensitive data and patents under development;

> taking control of servers, internal network and management infrastructures;

> use of company-owned servers for attacks against external targets;

> scams aimed at theft, embezzlement.

Companies are moving quickly to adopt mobility and cloud technology, but security concerns persist. Employees know that working remotely can be very beneficial to productivity, but security threats lurk. Mobility is driving business agility across all major industries. Mobile devices have become mainstream as powerful computing platforms that allow employees to work anywhere while helping businesses serve clients. Unfortunately, millions of smartphones and devices in the hands of employees and clients represent a high-value attack opportunity for hackers and cybercriminals. Conventional IT approaches used to protect company-owned networks, servers, applications and computers do not address the exposure of a growing and highly distributed mobile attack surface. Just one compromised device can turn into a very costly security breach for an enterprise. Enterprise mobility requires specially designed security tools to detect any unwanted behavior and protect mobile devices from known and unknown cyber attacks wherever they occur: at the device level, via networks, applications and malware.