Find answers to commonly asked questions about our services.
What is Cloud Incident Response?
Cloud incident response refers to the process of detecting, investigating, and responding to security incidents that occur in a cloud environment.
What is Business Email Compromise (BEC)?
Business Email Compromise/Email Account Compromise (BEC) is a sophisticated scam that targets both businesses and individuals who perform legitimate transfer-of-funds requests.
The scam is frequently carried out when an individual compromises legitimate business or personal email accounts through social engineering or computer intrusion to conduct unauthorized transfers of funds.
The scam is not always associated with a transfer-of-funds request. Often times BEC variations involve compromising legitimate business email accounts and requesting employees’ Personally Identifiable Information,Wage and Tax Statement (W-2) forms, and crypto currency wallets.
What is Phishing?
Phishing is a form of cyberattack where malicious actors use deceptive emails or websites to steal sensitive information such as login credentials or credit card numbers.
Do you offer international shipping?
Yes, we offer international shipping to selected countries. During the checkout process, you will be able to see if your country is eligible for shipping. Please note that additional customs fees or taxes may apply upon delivery, which are the responsibility of the recipient.
What is Reactive vs. Proactive services?
Reactive services refer to emergency services performed in reaction to a security event/incident. Proactive services are performed prior to a security incident, with the goal being improving security posture and defenses to reduce the risk and impact of future threats.
What are the signs of a phishing attack?
Common signs include unfamiliar email addresses, unexpected attachments, requests for sensitive information, or a sense of urgency in the message.
What is a Tabletop Exercise?
A tabletop exercise is a simulation-based exercise where teams discuss and practice responding to security incidents in a controlled, scenario-based exercise.
Do you offer ongoing monitoring services?
While we focus primarily on incident response and proactive services, we can recommend trusted partners for ongoing monitoring solutions.
What should I do if I suspect a cloud security breach?
If you suspect an attack, contact our team immediately for guidance and assistance. Time is critical in these situations.