The importance of cybersecurity cannot be overstated.
Considering the Internet of Things technologies and its abilities, we pay special attention to making sure that the products that we develop and the data transferred is well-protected.

RunOk.Lab company provides a wide range of services related to cybersecurity
IT Security Audit

The audit of the organization’s IT security includes checking the vulnerabilities and testing the penetration abilities.

Checking for possible entry points in the network infrastructureb

Checking the IT systems for possible vulnerabilities

Providing guidance for creating an infrastructure that is resistant to penetration

Stress-testing the networks and organization’s services and providing recommendations regarding the improvement of the services stability.

System’s check for Malware

The check involves analysing the systems and looking for possible malware programs or viruses.

Inspecting the systems and networks for possible malware

Analysing the possible risks for malware entry

rotecting from the malware

Creating system-specific malware protection protocols and writing recommendations for end users of PCs, network infrastructure, server platforms, and company’s IT services in general.

Hack Investigation

We offer the service of investigating the hacking attacks and making sure that the situation does not happen again.

Finding the entry point of the hacker

Analyzing the attacker’s actions

Re-creating a retrospective attack

Identifying the penetration consequences

Closing (and/or protecting) the hacker’s possible entry points from the IT infrastructure of the organization

PENETRATION TESTING

Penetration testing (sometimes known as white hacking) is basically an official hacking
into the organization’s systems and networks in order to identify the vulnerabilities.
After the penetration testing is done, a special detailed report is prepared and presented where the entry points are described.

Penetration testing (sometimes known as white hacking) is basically an official hacking
into the organization’s systems and networks in order to identify the vulnerabilities.
After the penetration testing is done, a special detailed report is prepared and presented where the entry points are described.



OUR CERTIFICATES:

We perform the testing in two ways: Black box and Grey box.

Grey box is the kind of testing performed when the tester knows some of the details about the system and the network.
Black box, on the other hand, is conducted without any knowledge of the systems and networks.

Considering the fact that Black box offers more unbiased version of report, this is the option we prefer and recommend.

The main areas where the Black box testing is applied are:

  • Gaining external data about the tested object
  • Checking the vulnerabilities of the company’s web services
  • Checking the vulnerabilities of the company’s open web hosts
  • Checking the vulnerabilities of the company’s web applications
  • Checking the vulnerabilities of the company’s network equipment
  • Penetrating into the LAN and network infrastructure analysis
  • Gaining admin access permissions for the tested local network
By using this site you agree to the Privacy Policy and Cookie Policy.
Accept