Whether your organization already has an ISMS in place or is in the process of implementing one under standards such as ISO27001, ENS, NIS2, DORA, etc., we can act as Security Manager (CISO) and help you manage security in your organization.
If your organization is a Spanish Public Administration or provides services to the Public Administration and information is transmitted through automated systems, the current regulations require the implementation of a Management System aligned to ENS with measures aimed at protecting information, as well as the companies that cooperate.
ISO/IEC 27001 is a certifiable international standard developed to assist in the implementation of an Information Security Management System, under the precept of the three most important security pillars: Availability, Confidentiality, and Integrity of information and information systems.
The first step in gaining a strategic view of the risks to which your organization is exposed is to conduct a Risk Analysis. It consists of identifying and evaluating the various threats that affect the human, technological, software, etc. levels that may affect the business.
With a gap analysis, we are able to highlight the differences between the current state of security of a Management System in an organization and the specific requirements of the industry and/or current regulations.
Organizations often deal with legal processes where providing a computer forensics report that proves the authenticity of digital evidence is a necessity, according to court rulings.
With our incident response team (CSIRT), we handle crisis response in organizations for incidents such as cyberattacks on your applications, information compromise, identity theft, DDoS attacks, system failures, etc. We are responsible for identifying, containing, and reacting to a security incident.
Antivirus software sometimes detects suspicious pieces of malware and automatically sends them to its laboratories for examination. In cases where employees of your organization detect anomalous behavior or suspicious pieces of software, our laboratory examines the details of a piece of malware and who might be trying to carry out a cyberattack on your infrastructure and networks.
Forensic analyses are assignments carried out by organizations to analyze a suspected security compromise on a device. Using analysis tools and methodologies, we can identify the origin of the alleged breach, identifying those technical selectors such as email, IP, crypto, etc. addresses, date, time, TTPs, and other data relevant to track the investigation in legal matters.
Phishing attacks carried out today against companies come from seemingly reliable sources and seek to obtain corporate information that users can provide (access passwords to compromise critical services, business information, make bank transfers, etc.) and even to submit, through Ransomware, to blackmail for large sums of money.
The cybersecurity audit of wireless networks allows for the analysis, verification, and evaluation of wireless networks, detecting potential security issues.
The Cybersecurity Audit of Web Application / Mobile APPs / Web Services allows us to detect the vulnerabilities that custom-developed applications may have for your organization. Are you sure they are developed following the highest guarantees?

