Enhance Your Security
with Telelink’s Posture Assessment

    Secure your spot on the waiting list for a complimentary cybersecurity posture assessment:

    Although the Cybersecurity Posture Assessment service of Telelink Business Services is non-intrusive by nature, by submitting this form you agree to give us consent to proceed with this assessment of your organization and receive back a report and other relevant information from Telelink Business Services.

    All data provided will be used according to EU GDPR regulation and will not be shared with any third parties outside the EU

    Digital Footprint

    During this stage our team will identify publicly accessible hosts associated with your company and their corresponding core technologies. Hosts that will be discovered but are not accessible will not be included in the final report.

    Web Site Encryption

    Our team will check the information about the SSL certificates status on the different hosts, part of your infrastructure as SSL certificates play a prominent role in safeguarding communication by encrypting the traffic between the client and the server.

    DNS Health

    This stage aims to review the configuration of the DNS servers owned by your company. The Telelink Business Services’ team of experts will check for common misconfigurations – the lack of certain records in the DNS zone (SPF, DKIM, DMARC, other), recursive DNS queries, zone transfer possibilities and other.

    Domain Reputation

    During this stage our team of experts will check the IP addresses owned by your company against public real-time blacklists for any positive results which may suggest unauthorized sending of spam messages meaning it can be a sign of malicious activity from within the organization.

    Web Application Security 

    Our team will investigate common misconfigurations in the web applications in use by your organization – without engaging with the web apps dynamically but just looking for potentially vulnerable software versions, HTTP Response headers, Cookie settings, Anti-CSRF tokens, SSL certificate checks, etc.

    Network Security

    Our team will assess the server’s configuration that are part of your organization’s internet-facing infrastructure – open ports, their running services and security issues associated with their corresponding versions (if any).

    Disclosure of Public Assets

    Our team will try to find publicly accessible files associated with your organization that include sensitive information, such as metadata valuable entries.

    Leaked Credentials

    During this phase our team will try to find employee’s credentials associated with your organization’s domains in public databases of leaked credentials as finding such active user’s credentials usually is a trigger to hackers deciding to attack.

    Privacy

    Review whether your website has privacy policy published, as required per the General Data Protection Regulation (GDPR).

    Key features

    Service Engagement Process

    Initial Consultation

    Understanding the company’s business context, specific concerns, and objectives for the cybersecurity assessment. Before we start the posture assessment service for your business, you will need to sign a NDA Form, which will be sent to you after we contact you for starting the procedure.

    Understanding the company’s business context, specific concerns, and objectives for the cybersecurity assessment. Before we start the posture assessment service for your business, you will need to sign a NDA Form, which will be sent to you after we contact you for starting the procedure.

    Assessment Execution

    Deployment of a team of cybersecurity experts to conduct a thorough assessment using a blend of automated tools and manual techniques.

    Deployment of a team of cybersecurity experts to conduct a thorough assessment using a blend of automated tools and manual techniques.

    Report Presentation and Review

    Presentation of findings and recommendations, followed by a Q&A session to clarify and discuss the next steps.

    Presentation of findings and recommendations, followed by a Q&A session to clarify and discuss the next steps.

    Follow-Up Support

    Optional post-assessment support to assist with the implementation of recommended actions and measures.

    Optional post-assessment support to assist with the implementation of recommended actions and measures.

    Team composition

    The team consists of penetration testers with years of experience in the field of professional ethical hacking, holding internationally recognized certifications in this area, such as OSCP, OSWP, CEH and JPT. The team employs during the tests advanced techniques to simulate real-world cyber-attacks, identifying potential entry points, weaknesses, and vulnerabilities that malicious actors could exploit.