Cyber & Physical Security

Cyber Security

Security goes way beyond installing a firewall and configuring an anti-virus solution. Great security is properly planned, designed, implemented, maintained, and is an evolving process. Our certified cyber security specialists apply valuable industry experience to your business. Our goal is to protect your infrastructure from threats, warnings, vulnerabilities, and legal liabilities. We provide guidelines and checks and balances for timely intervention of a possible threat or vulnerability.

Our mission is to:

  • Detect, deter, assess, warn, respond, and investigate unlawful acts involving information technologies and unlawful acts that threaten or target your critical business functions
  • Manage computer intrusion detection systems (IDS) from both external and internal threats
  • Protect your organization from cyber terrorism, attacks, cracks and hacks
  • Defend your organization with a fortified perimeter that is inline with your organization's business goals and objectives
  • Design and implement redundancies in your existing firewall solution
  • Recommend appropriate backup techniques, backup scheduling and recovery methodology
  • Recommend and implement enterprise level anti-virus solutions
  • Train your staff and empower them with the latest techniques to protect your organization from cyber vulnerabilities

Areas of expertise include:

  • WIN32, BSD, AIX, HP-UX, Linux, Cisco IOS, Netware, TCP, UDP, IP, IPX, HTTP, SMTP, FTP, DNS, LDAP, NetBIOS, shell scripting, Perl, C, Java, SSL, PKI, IPSec, Firewalls (Checkpoint, Cisco PIX), Intrusion Detection (Snort, ISS), Authentication, etc.

Tools from our security arsenal include:

  • NMAP, Nessus, nslookup, TcpDump, WINdump, Netcat, MSBA, HFNetChk, BSDAirtools, CIS Scoring tools, L0pht Crack, NetBIOS Auditing Tool, Ethereal

Our deployment specialties include:

  • Identity based PKI Solution such as Voltage, Thawte, etc, various intrusion detection systems, such as, Snort, RealSecure, Tripwire, etc

Vast Experience with:

  • Network Management tools, such as, OpenView, Tivoli, etc., creating new IDS signatures to detect specific attacks, incident response management , analyzing low level logs to detect suspicious activities, and analysis of CVE and Bugtraq databases

Additional vulnerability analysis including:

  • Unsecured Accounts - Null Password, Admin no PW, PW no expiration…
  • Mis-Configurations - NetBIOS, Null Sessions…
  • Unnecessary Services - Telnet, Remote Access, Remote Exe…
  • Backdoors - Netbus, Backorifice, Subseven…
  • Software Defects - Resolved by patches, service packs and hot fixes…

Physical Security

Cyber Communication’s consultants are highly qualified to conduct physical security reviews and operational analysis. We are current in understanding and utilizing new technology available which can help protect and deter security violations and criminal activity. We have experience in providing security reviews and operational analysis in various industries such as government buildings, distribution centers, call centers and others. Our services include examining your business perimeter; building access control, employee identification systems, fencing, lighting and CCTV systems. General security related procedures involving loss prevention are reviewed. In addition to the physical examination, we will review crime statistics in the surrounding areas. We can also analyze perceived security/crime concerns by interviewing a sample group of employees and managers.

Our services include:

  • Penetration audits to determine if your current security programs and employee access control procedures are being followed
  • Site audit: Determining if physical and environmental protection controls sufficient
  • Formal, documented procedures to facilitate the implementation of the physical protection policy
  • A written report with our findings and recommendations

Assessment areas include:

  • Physical and Environmental Protection Policy and Procedures
  • Power Equipment and Power Cabling
  • Physical Access Control
  • Access Records
  • Physical Access Monitoring
  • Visitor Control
  • Access Control for Output Devices
  • Physical Access Authorizations
  • Location of Information System Components
  • Information System Component Delivery and Removal
  • Water Damage Protection
  • Temperature and Humidity Controls
  • Fire Protection
  • Emergency Power
  • Emergency Shut-off
  • Emergency Lighting
  • General Physical Controls Applicable to Alternate Work Sites

Operational Analysis

Cyber Communication’s consultants are highly qualified to conduct physical security reviews and operational analysis. We are current in understanding and utilizing new technology available which can help protect and deter security violations and criminal activity. We have experience in providing security reviews and operational analysis in various industries such as government buildings, distribution centers, call centers and others. Our services include examining your business perimeter; building access control, employee identification systems, fencing, lighting and CCTV systems. General security related procedures involving loss prevention are reviewed. In addition to the physical examination, we will review crime statistics in the surrounding areas. We can also analyze perceived security/crime concerns by interviewing a sample group of employees and managers.

Our services include:

  • Penetration audits (link to penetration testing) to determine if your current security programs and employee access control procedures are being followed
  • Site audit, are your physical and environmental protection controls sufficient (link to physical security)
  • Formal, documented procedures to facilitate the implementation of the physical protection policy
  • Cyber security and an awareness of employee responsibility (Cyber Security)
  • A written report with our findings and recommendations

IT Consulting

Cyber Communication's IT consulting services provide top-quality IT development for any specific need or goal. We are experts in Web Development, ASP.net, Java, Java Servlets, JSP, XML, PHP, Cold Fusion, Visual Basic, C, C++, CGI/Perl, Kana and system administration for UNIX, Linux, OS/2 and Windows platforms. Cyber Communication consultants also provide database administration and programming, specializing in Oracle, SQL Server, Informix, mySQL, and mSQL.

Cyber Communication's experts

Business Resiliency -CyberCommunication Inc.

Cyber Communication's security team has the experience, knowledge, and wisdom to identify risks and recommend mitigation strategies, utilizing both technical and business expertise. In a risk-based approach, we analyze and address today's threats with the most current and proven solutions.