-
-
Knowledge is Power!
Be aware of the threats. Start your group Cyber Security Awareness Training now!
-
Finding the shortest path to the solution.
Consultancy, Solution Design, Planning, Implementing and Optimizing Networks
WHY we do security...
we believe in providing the protection people deserve from incidents they can prevent.

Security Consultancy
Cyber Security Assessment
Penetration Testing
Network Hardening
Ethical Hacking
Security Awareness Training
Remediation Plan

Unique Training
Hands on, real life scenarios
with demonstrations, whiteboarding
minus the marketing/sales fluff!
- Security Awareness
- Real Life Networking
- Practical Privacy

Network Consultancy
Network Assessment
Advanced Configuration:
Wireless, Routing, Switching, Security, VoIP, Data Centers, Servers, Virtualization
Cabling: Termination, Testing
Support & Maintenance

Let technology be the catalyst for success
Technology Roadmap
Make decisions based on the current technology trends, available options and future proof your investment. Take advantage of our vast market experience combined with the technology skills to make informed decisions.
Project Management
Incorporate a phased approach in migrating to better systems in order to minimize downtime. Plan every step diligently with equipment, resource and time management.
Network Assessment
Know what you have and how to get the most out of it. Most people only utilize < 30% of the technology potential. An assessment will show you potential pitfalls, upgrades and opportunities for enhancements and optimizations.
Security Assessment
Be ahead of the game by protecting your network from hackers, disgruntled employees, malicious attacks, threats and vulnerabilities. A security assessment can highlight the vulnerabilities, risks and formulate a remediation plan based on a security framework.
Training
It's impossible for every company to have all the geeks looking out for their best interest. But we can train staff on the basics, from Security Awareness for everyone, to Real Life Networking 101 for admins and get the most out of the human investment.
Support & Maintenance
Let us take the headache and expertise of maintaining complex networks and allow your employees to focus on the company goals. We can handle proactive monitoring, upgrading, patching, optimizations and planning of your network, security and overall technology infrastructure so that your organization can run smooth.
LATEST Blog articles
A wide array of random tech articles, tips, shortcuts, configurations, troubleshooting, etc ....
Top FREE Applications Every Mac 💻 Should Have
A Mac Operating System has plenty of useful applications built right into it (like telnet, ssh, tftp, ftp) but depending on your use, the list below could really add value especially if you’re into privacy and security. Security (Anti-virus/Malware) Myth: Macs don’t require an antivirus. Truth: Most viruses are created to target the bulk of […]
Website Safeguards: Security Hardening Checklist
Defacement A website is the front door and the face of your organization. Many hackers deface an organization by hacking their website and posting their message on it. (some well known victims: MIT, NASA, eBay, PayPal, Mossad, Forbes, WikiLeaks, Oracle, Russia Today) DDoS Attackers often use a Distributed Denial of Service attack to overwhelm a […]
Cyber Warfare: Bringing a Knife to a Gunfight
The enemies of today are well equipped with the latest tools and techniques, knowledge on vulnerabilities and zero day attacks. On the flip side, most companies and individuals are not. Reasons for Lapse in Security Most organizations don’t take security seriously until they get affected. They do not see tangible results It is not their […]
DNS for Privacy 1.1.1.1
First and foremost, this is an awesome domain name!!! Whois shows it was registered in 1997! But I’m sidetracking. This is CloudFlares privacy focussed DNS service. DNS recap: Just like your phone book translates names into phone numbers, DNS translates URLs (like google.com) to it’s actual IP address (like 74.125.124.10) which no one has the […]
What’s with this GDPR?
What is GDPR? GDPR (General Data Protection Regulation) is the new EU regulation around data privacy. It primarily highlights that their citizens data should be fully in the control of the citizen and with complete transparency on how it’s used. In a nutshell, the exact opposite of what happens with user data in the US. […]
Open Source Network/Security Software for the Enterprise
Software vendors are going to kill me for saying this, but you don't have to break the bank with software costs. There are FREE alternatives. Vendors may debate over which are better. But that decision has to be made on a per software basis and per use-case. As long as you have good support, Open […]
Remembering 100s of passwords 🗒, a thing of the past (Top 5 Password Managers)
Gone are the days when you only needed to remember 3-5 passwords. Passwords were primarily for email accounts and a handful of social media and maybe an online bank account. Now you need at least 10 accounts for literally everything, from emails, eCommerce sites, social media, cloud apps, your thermostat, all your gov sites. You […]
Preparing for Death 💀 in a Digital World (Top 10 Checklist)
Death does not come to anyone by asking. It is always sudden and people never expect it. Our lives are heavily intertwined in the digital world. As such, when (not if) that happens we should be prepared from a Cyber perspective. We have hundreds of online credentials that our lives depend on. It would make the […]
Don’t WannaCry 😭Tonight
Name: Wanna Cry a.k.a Wanna Crypt Type: Worm, Ransomware Target: Windows Computers running SMB file sharing Original Creators: NSA (Yes, the US gov.) EternalBlue is the exploit that was developed by the NSA most likely to be used on “we the people”. It was leaked by hackers in April 2017 and used in the WannaCry ransomware […]
Dark Web, Deep Web, Clear Web 🕸, what’s the different?
There’s a lot of talk about the Deep Dark web. These words are used interchangeably, but they are very different. Surface or Clear Web This is what most of us are familiar with. Anything searchable by Google (hence indexed or crawled by search engines) is part of the Surface web 🕸. We may think that […]