Close desktop login portal

Client Login

Select one of the portals below and login with your credentials

Advisory

Richey May Advisory provides the full spectrum of transformative solutions for your business. From Technology and Risk Management to Specialty Audit Services and more, Richey May Advisory has the solutions you need to find and focus on your competitive advantage.

Learn More

Richey May Advisory

Richey May Advisory provides the full spectrum of transformative solutions for your business. From Technology and Risk Management to Specialty Audit Services and more, Richey May Advisory has the solutions you need to find and focus on your competitive advantage.

Learn More

Contact Us

Richey May Headquarters
9780 S Meridian Blvd., Suite 500
Englewood, CO 80112
Directions
303-721-6232

Question or comments?  Click here to fill out our inquiry form.

Richey May Advisory

Richey May Advisory provides the full spectrum of transformative solutions for your business. From Technology and Risk Management to Specialty Audit Services and more, Richey May Advisory has the solutions you need to find and focus on your competitive advantage.

Learn More

Richey May Advisory

Richey May Advisory provides the full spectrum of transformative solutions for your business. From Technology and Risk Management to Specialty Audit Services and more, Richey May Advisory has the solutions you need to find and focus on your competitive advantage.

Learn More

Contact Us

Richey May Headquarters
9780 S Meridian Blvd., Suite 500
Englewood, CO 80112
Directions
303-721-6232

Question or comments?  Click here to fill out our inquiry form.

Mobile menu toggle
Back to menuBack to menu
Richey May Headquarters
9780 S Meridian Blvd., Suite 500
Englewood, CO 80112
Directions
303-721-6232

Employment Documents

Testing4321


Cybersecurity Threat Management

Web Application Cybersecurity Assessment

Whether your application is SaaS based or internally hosted, the opportunity for exploitation and malicious activity exists and is regularly taken advantage of by attackers. Richey May’s Web Application Assessments will allow you to enhance your application’s security by uncovering vulnerabilities and systemic design flaws that might allow attackers to utilize your application in unintended ways. First looking at your application from an unauthenticated viewpoint, Richey May will then test each role within your application to ensure it’s not subject to vulnerabilities, focusing on the OWASP Top 10 as a starting point. Understanding the functionality of your application is essential to finding ways of turning your intended use cases into abuse cases, providing you with a detailed list of how attackers might escalate their privileges, take advantage of vulnerable 3rd party libraries, or utilize other methods to gain access and cause harm.

 

Wide Range of  Cybersecurity Assessments

Enhance your organization’s defense against cyber threats with our tailored Cybersecurity Assessments. Our expert team delivers comprehensive evaluations to safeguard your critical assets, providing you with the insights and recommendations needed to strengthen your cybersecurity posture.

Discover the power of our cutting-edge security assessment techniques and tools to keep you ahead of emerging threats. With a focus on efficiency and effectiveness, our detailed risk analysis and management strategies empower your team to proactively mitigate vulnerabilities and safeguard your digital ecosystem.

Additional Assessments

API Penetration Testing

Over 85% of all internet traffic today occurs through APIs, as part of our Web Application Assessment, all API endpoints will be thoroughly tested, focusing on OWASP’s Top 10 APIs as a starting point. For organizations that utilize APIs strictly without Application Front-ends, Richey May also provides custom API Penetration Tests to ensure that this commonly exploited way of moving data is properly secured. This testing is essential, as almost 89% of all web attacks utilize common API vulnerabilities.

Social Engineering Cybersecurity Assessment

Automated Phishing Exercises have been used for more than decade in the workplace to assist in training employees on what to look for when a malicious email ends up in their mailbox. The reality is most attackers today aren’t utilizing generic, automated messages, but rather highly customized, targeted emails that could convince even the most diligent of employees. Richey May simulates these types of Phishing emails and provides relevant and appropriate training exercises for our clients to ensure employees are up to speed on the latest tactics.

As employees become more familiar and aware of email phishing attacks, attackers are becoming increasingly creative and pivoting to phone calls and text messages for attack vectors, commonly known as Vishing and SMSing, respectively. Richey May will simulate these attacks on targeted employees to identify potential opportunities for training exercises to avoid potential compromise via these methods. These attacks can take place on their own, or as part of a penetration test as a method for entry, providing the most realistic emulation of an attack.

Mobile Application Cybersecurity Assessment

Mobile Applications provide their own set of unique considerations for security. Following OWASP’s Mobile Application Security Verification Standard, Richey May performs automated and manual analysis of your Android and /or iOS Applications, identifying vulnerabilities and exploiting them the way an attacker would.

Physical Security Cybersecurity Assessments

While many organizations have trained their employees on the technical security controls, many organizations are unaware of the physical security gaps that exists that can put their systems at risk. Richey May’s Physical Security Assessment will identify potential security vulnerabilities within your organization’s physical and procedural security controls, outlining opportunities for improvement and ways to prevent potential physical methods for attack. Examples can include USB Sprinkling, Dumpster Diving, and Guided Walkthroughs to identify security camera blind spots, potential entry points, and other building weaknesses.

Request more info

To speak to one of our professionals, fill out the form and we will be in contact shortly.