Tri-City Technology is an Information Technology Security Support and Consulting Firm. We are privately owned and provide a customized variety of solutions, specializing in proactive adversarial simulations.
Questions to ask of your company:
Does our Outsourced IT Company or IT Department provide regular offensive auditing per regulations of our sector/industry?
What threats are currently targeting our company?
How is our data managed?
Who has access, whether physically or remotely to any of our data? How much access do they have? Do we have a system in place that says "Person X viewed Document Y and 3 AM?"
Does our company have a single client residing in the EU?
What is our current policy if ransomware were to be unleashed on our network?
Who do I contact in the event of an IT Disaster? (Not the people who left that friendly (and only) note for you on your desktop)
Based on the type of company we are, what terrorist organizations or nation-state hackers are targeting us? (This is what a regular Red Team Audit should focus on). All too often, we see banks having IT Security Tests performed that should be for a manufacturing firm. This simply makes no logical sense in how hackers actually think and act. Regularly, companies are overcharged and uneducated on their actual protection.
**Free tip: If a company runs a vulnerability scan on your systems and calls it a penetration test, fire them immediately**
I accidentally clicked that link, clicked enable content, and okay (I JUST WANTED TO SEE MY FILES).. now my computer is telling me all my files are locked and I only have three days to get Monero or Bitcoin to some strange address to a Terrorist organization...but they are acting strangely friendly??
1) What just happened?
2) Is this legitimate?
3) Who do I contact
4)What do I do now? (Do NOT pay it, it is a federal crime.)
A quick test to see if your company has overlooked misconfigurations (if you are not an admin): If you are on a Windows computer, press the Windows key, type "File Explorer" and press enter, go to C:\Users\. Within this folder are you able to view other users' documents on their desktops, scans folders, or non-password-protected passwords.txt file on their desktops? If so, please give us a call immediately.
When you got promoted recently, did your department change? If so, are you still able to access things only your old department should have access to?
All services offered are unique, customized, and handcrafted for your company. Our main strategies and procedures are centered around giving our clients a tailored form of their threat landscape. We focus on the modern-day world of threats to critical company assets and processes.
When you've got questions, audits, checkboxes, and want to respect your clients' data through doing thorough and up-to-date manual testing, please give us a call. We are here for you.