ASSESS
Cyber security review
Review your current security controls & processes to identify gaps
Compromise assessment
Interrogate your endpoints to identify evidence of malicious behaviour
Penetration testing
Simulate attacks on your network & apps to understand your weaknesses