what we offer
Jetstreamcyber Security will help your business proactively prioritise your efforts to reduce risk and tap into the inherent value of security by leveraging our specialized skills to support operations, increase visibility and contain threats.
Information Security Program and Enterprise Security Framework
Irrespective of the size of your business or industry you’re in, an Information Security Program is an imperative element of any organization.
A security program comprises a wide-ranging set of information security policies and procedures, which is the foundation to any security initiative in your organization. Whether you’re responsible for protecting data, personally identifiable information or any other proprietary information, having a fully developed program provides you with a holistic approach for how to safeguard and protect the information for which you are responsible.
“A company with no Security Policy, has no security at all”.
A security framework will upgrade your existing security protocols and bring in new security layers if there isn’t one existing already. These frameworks will also help enterprises understand where their security standards are and how to improve them.
Cyber Essentials
Obtaining Cyber Essentials certification will demonstrate to your customers, partners and suppliers that you have adopted good practice when it comes to information security.
GDPR Compliance and Requirements
Meet your legal requirements, free up your internal resources, and gain peace of mind in meeting your legal requirements by accessing our broad range of data protection services, customised to your business needs.
We’ll work closely with you through your GDPR audit to find out exactly what your current compliance status looks like. Based on the gap analysis findings you’ll receive a customised implementation plan, meaning you only pay for the services that your business needs.
Business Continuity and Disaster Recovery
To ensure that operations remain up and running during hurricane, tornado, or rainy seasons, businesses must have a Disaster Recovery Plan that has been developed, tested, and is in place and known to all relevant parties. Jetstreamcyber will assist with developing a Business Impact Analysis, Strategy Selection and Business Continuity and Disaster Recovery plan documentation.
Penetration Testing Six Phases
One over-looked step to penetration testing is pre-engagement interactions or scoping. During this pre-phase, a penetration testing company will outline the logistics of the test, expectations, legal implications, objectives and goals the customer would like to achieve. During the Pre-Engagement phase, the penetration testers should work with your company to fully understand any risks, your organizational culture, and the best pentesting strategy for your organization. You may want to perform a white box, black box, or gray box penetration test. It’s at this stage when the planning occurs along with aligning your goals to specific pentesting outcomes.
Reconnaissance or Open Source Intelligence (OSINT) gathering is an important first step in penetration testing. A pentester works on gathering as much intelligence on your organization and the potential targets for exploit. Depending on which type of pentest you agree upon, your penetration tester may have varying degrees of information about your organization or may need to identify critical information on their own to uncover vulnerabilities and entry points in your environment.
During the threat modeling and vulnerability identification phase, the tester identifies targets and maps the attack vectors. Any information gathered during the Reconnaissance phase is used to inform the method of attack during the penetration test.
A pentester will often use a vulnerability scanner to complete a discovery and inventory on the security risks posed by identified vulnerabilities. Then the pentester will validate if the vulnerability is exploitable. The list of vulnerabilities is shared at the end of the pentest exercise during the reporting phase.
With a map of all possible vulnerabilities and entry points, the pentester begins to test the exploits found within your network, applications, and data. The goal is for the ethical hacker is to see exactly how far they can get into your environment, identify high-value targets, and avoid any detection. If you established a scope initially, then the pentester will only go as far as determined by the guidelines you agreed upon during the initial scoping. For example, you may define in your scope to not pentest cloud services or avoid a zero-day attack simulation.
After the exploitation phase is complete, the goal is to document the methods used to gain access to your organization’s valuable information. The penetration tester should be able to determine the value of the compromised systems and any value associated with the sensitive data captured.
Some pentesters are unable to quantify the impact of accessing data or are unable to provide recommendations on how to remediate the vulnerabilities within the environment. Make sure you ask to see a sanitized penetration testing report that clearly shows recommendations for fixing security holes and vulnerabilities.
Once the penetration testing recommendations are complete, the tester should clean up the environment, reconfigure any access he/she obtained to penetrate the environment, and prevent future unauthorized access into the system through whatever means necessary.
Reporting is often regarded as the most critical aspect of a pentest. It’s where you will obtain written recommendations from the penetration testing company and have an opportunity to review the findings from the report with the ethical hacker(s). The findings and detailed explanations from the report will offer you insights and opportunities to significantly improve your security posture. The report should show you exactly how entry points were discovered from the OSINT and Threat Modeling phase as well as how you can remediate the security issues found during the Exploitation phase.
Data Protection
Forcepoint’s human-centric cybersecurity systems protect your most valuable assets at the human point: the intersection of users, data & networks.
Purpose-built and ready to protect, Forcepoint is driven by an understanding of human behaviour and intent. Their innovation technology, decades of experience and clear vision help solve critical security issues to protect employees, business data and IP.
Forcepoint offers a systems-oriented approach to insider threat detection and analytics, cloud-based user and application protection, next-gen network protection data security and systems visibility.