+27 82 883 0536 info@checkmark.co.za

The damage to both brand and consumer confidence can be immeasurable as breaches are becoming more and more difficult to hide.

Hacking and cyber espionage have become commonplace. Companies (and governments) spy on each other on a daily basis and hackers make millions from selling information to competitors. Or worse, they encrypt your data and try to sell the key to your own information back to you. The devastation to both brand and consumer confidence can be immeasurable as breaches are becoming more and more difficult to hide. 

Laws like POPI and GDPR require business owners to prove that they have taken all reasonable measures to ensure that private data is protected

The damage to both brand and consumer confidence can be immeasurable as breaches are becoming more and more difficult to hide.

Hacking and cyber espionage have become commonplace. Companies (and governments) spy on each other on a daily basis and hackers make millions from selling information to competitors. Or worse, they encrypt your data and try to sell the key to your own information back to you. The devastation to both brand and consumer confidence can be immeasurable as breaches are becoming more and more difficult to hide. 

Laws like POPI and GDPR require business owners to prove that they have taken all reasonable measures to ensure that private data is protected

The damage to both brand and consumer confidence can be immeasurable as breaches are becoming more and more difficult to hide.

Hacking and cyber espionage have become commonplace. Companies (and governments) spy on each other on a daily basis and hackers make millions from selling information to competitors. Or worse, they encrypt your data and try to sell the key to your own information back to you. The devastation to both brand and consumer confidence can be immeasurable as breaches are becoming more and more difficult to hide. 

Laws like POPI and GDPR require business owners to prove that they have taken all reasonable measures to ensure that private data is protected

According to Intel owned McAfee, South Africa’s annual loss from cyber-crime was R5.8 billion

According to IBM the average cost of a Cyber breach in South Africa is R32.36 million, a 12% increase.

The cost of cyber-crime worldwide is estimated to reach 27 trillion ZAR

Did you know?

Cyber risk moved from 12th to 3rd place in the Lloyd’s 2013 Global Risk Index

%

of data breaches are uncovered by the attacked organisation.

is the average amount of days it takes between compromise and detection

According to Intel owned McAfee, South Africa’s annual loss from cyber-crime was R5.8 billion

According to IBM the average cost of a Cyber breach in South Africa is R32.36 million, a 12% increase.

The cost of cyber-crime worldwide is estimated to reach 27 trillion ZAR

Did you know?

Cyber risk moved from 12th to 3rd place in the Lloyd’s 2013 Global Risk Index

%

of data breaches are uncovered by the attacked organisation.

is the average amount of days it takes between compromise and detection

According to Intel owned McAfee, South Africa’s annual loss from cyber-crime was R5.8 billion

According to IBM the average cost of a Cyber breach in South Africa is R32.36 million, a 12% increase.

The cost of cyber-crime worldwide is estimated to reach 27 trillion ZAR

Did you know?

Cyber risk moved from 12th to 3rd place in the Lloyd’s 2013 Global Risk Index

%

of data breaches are uncovered by the attacked organisation.

is the average amount of days it takes between compromise and detection

Services

We have put together a full suite of services available as ad-hoc or as a managed service solution.
These include:

  • Cyber  Defence Solutions

  • Penetration Testing

  • Security Vulnerability Assessment

  • Cyber Readiness Assessment

  • Cyber Risk Assessment 

  • Social Engineering Practice

  • Liability and Cyber Insurance

  • Gap Analysis

  • First Responders

  • Incident Handling and Response

  • Cyber Training

  • SOC/SIEM

Services

We have put together a full suite of services available as ad-hoc or as a managed service solution. These include:

  • Cyber  Defence Solutions

  • Penetration Testing

  • Security Vulnerability Assessment

  • Cyber Readiness Assessment

  • Cyber Risk Assessment

  • Social Engineering Practice

  • Liability and Cyber Insurance

  • Gap Analysis

  • First Responders

  • Incident Handling and Response

  • Cyber Training

  • SOC/SIEM

Services

We have put together a full suite of services available as ad-hoc or as a managed service solution. These include:

  • Cyber  Defence Solutions

  • Penetration Testing

  • Security Vulnerability Assessment

  • Cyber Readiness Assessment

  • Cyber Risk Assessment

  • Social Engineering Practice

  • Liability and Cyber Insurance

  • Gap Analysis

  • First Responders

  • Incident Handling and Response

  • Cyber Training

  • SOC/SIEM

Cyber Awareness Training

In an effort to combat cyber-crime Checkmark encourages organizational cyber awareness training programs as another weapon of defence against business crime. From basic courses aimed at general staff to advanced cyber courses targeting IT departments, our training curricula are certain to provide the most suitable educational defence against cybercrime. Checkmark also tests organisations’ cyber awareness defence via a series of social engineering attacks (non-evasive) whereby we effectively send various levels of phishing emails to the staff.

Cyber Awareness Training

In an effort to combat cyber-crime Checkmark encourages organizational cyber awareness training programs as another weapon of defence against business crime. From basic courses aimed at general staff to advanced cyber courses targeting IT departments, our training curricula are certain to provide the most suitable educational defence against cybercrime. Checkmark also tests organisations’ cyber awareness defence via a series of social engineering attacks (non-evasive) whereby we effectively send various levels of phishing emails to the staff.

Cyber Awareness Training

In an effort to combat cyber-crime Checkmark encourages organizational cyber awareness training programs as another weapon of defence against business crime. From basic courses aimed at general staff to advanced cyber courses targeting IT departments, our training curricula are certain to provide the most suitable educational defence against cybercrime. Checkmark also tests organisations’ cyber awareness defence via a series of social engineering attacks (non-evasive) whereby we effectively send various levels of phishing emails to the staff.

Technologies Used

  • Kali Linux

  • Metasploit

  • OpenVAS

  • Burp Suite

  • Nessus

  • Qualys

  • Proprietary software, tools and scripts developed in-house.

Contact us 

Let us help you with your cybersecurity requirements.
Secure your training seat. Secure your organisation.