Solutions

Our Services include:

Data Breach Incident Response

Ethical Hackers offers a full incident response service which includes digital forensic experts, a breach coach to help navigate the legal side of the incident, and communications expert for press releases and public notifications. If needed we can call upon Law enforcement for criminal related investigations as our experts have worked with many municipal, provincial and federal police forces. They will help guide your organization through this very difficult time. We will maintain full chain of custody of all evidence found, our breach coach will maintain client solicitor privilege and our investigation experts will help find the root cause of the problem.

Security Program Development and Management

Ethical Hackers will help you develop the strategic and tactical goals of your security program. Let us work with your organization to build to documentation, technical diagrams, logical data flows, risk assessments, hazard identifications, security assessments and business continuity plans. We will help you navigate the different frameworks such as ITGC, NIST CSF, PCI, MITRE, and ISO 27001. We can help you plan, develop and then manage the whole program from inception to deployment.

Security Assessments

Ethical Hackers will work with your team to identify security vulnerabilities and help your team manage, mitigate and remediate. Our consultants will work with you weekly, monthly or quarterly depending on your business needs and processes.

Phishing and Awareness Campaigns

Ethical Hackers will design custom phishing simulations to help increase awareness of targeted attacks to your organization. We will run the campaign over a period of time to measure improvement and effectiveness of the awareness training. We will also help develop training materials for your organization to train your employees so they may be better protected.

Business Continuity Planning (and Disaster Recovery)

Ethical Hackers will help you develop your business continuity plans so that when disasters occur, your business will have the resilience it needs to continue to function. Our experts will advise you on recovery objectives, backups and help you get back to normal.

Cisco Network Design and Assessment

Ethical Hackers has Cisco certified experts (CCNP/CCIE levels) to help with your network design and planning. Our Cisco experts can also help you identity bottlenecks, security gaps, BGP issues, OSPF issues, EIGRP issues and other network related issues. We can also help with data flow mapping and network diagramming projects.

Managed Server Colocation

Ethical Hackers have Server colocation space in the heart of Toronto’s downtown core. The space is ISP neutral. Currently accepting 1U, 2U or 10U rentals. Each rental comes with:

  • 2000GB Monthly Transfer (10U is 6000GB)
  • 99.99% Uptime Guarantee
  • 100Mbps Uplink Port
  • APC Remote Reboot Port
  • Government of Canada Critical Infrastructure building with 24/7 Escorted Access. Building is Man-trapped and all equipment is checked upon egress.

Vulnerability Assessment and Management

Ethical Hackers provides a continuous management service that helps identify vulnerabilities and reduce threat actors attack surface. Our experts will work with your team to identify your baseline. We will then assess and discover any vulnerabilities in your environment. We will help with the remediation and then reassess to make sure the vulnerability has been properly fixed.

Penetration Testing and Red Team Engagements

At Ethical Hackers we offer both a Penetration Test and a Red Team Engagement and yes we differentiate between the two. Our experts want your organization to have to most effective controls in place we set to test all of them by running periodic pen test and red team engagements. For Penetration Tests, our experts will be on-site typically 2-3 weeks. They will most likely be noisy on your network and aim to find as many gaps and exploit those in your infrastructure within the time allotted. For Red team engagements, our experts will typically take 3-4 weeks. Our red team engagements do not look for multiple vulnerabilities, instead we use targeted attack to stealthily ex-filtrate your most critical data. Our experts will test your incident response team, processes and technologies. They usually utilize social engineering, physical, wireless, external or spoofing attacks. Red team engagements are only for organizations with a more mature security program and want to test their people, process and technology.