Follow Us:

Use These Tool To Assess Yourself...

Many of these tools have been provided by our strategic security partners. All offer valuable insights into potential risks from cyber threats and best of all each tool is FREE with no obligation! Go ahead and get started with your self assessment!

If you need assistance with any of the tools or have any questions regarding their usage or output then please get in touch. We are also keen to hear any feedback on how you get on with the tools!

Are your users' passwords…P@ssw0rd? Verizon's recent Data Breach Report showed that 81% of hacking-related breaches used either stolen and/or weak passwords. Employees are the weakest link in your network security, using weak passwords and falling for phishing and social engineering attacks.

Are you an Easy Target for Spear Phishing? Many of the email addresses and identities of your organization are exposed on the internet and easy to find for cybercriminals. With that email attack surface, they can launch social engineering, spear phishing and ransomware attacks on your organisation.

A massive amount of passwords are compromised due to data breaches. Checks to see if your users are currently using passwords that are in publicly available breaches associated with your domain. Check against your Active Directory and identify compromised passwords in use right now.

Did you know that email is still the #1 attack vector used by the bad guys?<br /> Spoofed domains, malicious attachments and executables to name a few... With email still the #1 attack vector, do you know if hackers can get through your mail filters?

Discover dangerous look-alike domains that could be used against you! Since look-alike domains are a dangerous vector for phishing and other social engineering attacks, it’s top priority that you monitor for potentially harmful domains that can spoof your domain

Privileged account passwords are a hacker's favourite target. Once breached these accounts give hackers free reign of your network. Discover all your Windows privileged accounts, including service accounts, and get a detailed report that highlights any weak points.

Please note: Many of these tools are provided via links to third party websites, as such they are subject to the terms & conditions of those third parties.