Additional Assessments
API Penetration Testing
Over 85% of all internet traffic today occurs through APIs, as part of our Web Application Assessment, all API endpoints will be thoroughly tested, focusing on OWASP’s Top 10 APIs as a starting point. For organizations that utilize APIs strictly without Application Front-ends, Richey May also provides custom API Penetration Tests to ensure that this commonly exploited way of moving data is properly secured. This testing is essential, as almost 89% of all web attacks utilize common API vulnerabilities.
Social Engineering Cybersecurity Assessment
Automated Phishing Exercises have been used for more than decade in the workplace to assist in training employees on what to look for when a malicious email ends up in their mailbox. The reality is most attackers today aren’t utilizing generic, automated messages, but rather highly customized, targeted emails that could convince even the most diligent of employees. Richey May simulates these types of Phishing emails and provides relevant and appropriate training exercises for our clients to ensure employees are up to speed on the latest tactics.
As employees become more familiar and aware of email phishing attacks, attackers are becoming increasingly creative and pivoting to phone calls and text messages for attack vectors, commonly known as Vishing and SMSing, respectively. Richey May will simulate these attacks on targeted employees to identify potential opportunities for training exercises to avoid potential compromise via these methods. These attacks can take place on their own, or as part of a penetration test as a method for entry, providing the most realistic emulation of an attack.
Mobile Application Cybersecurity Assessment
Mobile Applications provide their own set of unique considerations for security. Following OWASP’s Mobile Application Security Verification Standard, Richey May performs automated and manual analysis of your Android and /or iOS Applications, identifying vulnerabilities and exploiting them the way an attacker would.
Physical Security Cybersecurity Assessments
While many organizations have trained their employees on the technical security controls, many organizations are unaware of the physical security gaps that exists that can put their systems at risk. Richey May’s Physical Security Assessment will identify potential security vulnerabilities within your organization’s physical and procedural security controls, outlining opportunities for improvement and ways to prevent potential physical methods for attack. Examples can include USB Sprinkling, Dumpster Diving, and Guided Walkthroughs to identify security camera blind spots, potential entry points, and other building weaknesses.