Our service is designed to help both public and private sector organisations detect and mitigate cyber threats that leverage stolen email addresses and passwords and personal identifying information BEFORE they become a security threat.
Dark Web monitoring leverages a combination of human and artificial intelligence that scours botnets, criminal chat rooms, blogs, Websites and bulletin boards, Peer to Peer networks, forums, private networks, and other black market sites 24/7, 365 days a year to identify stolen credentials and other personally identifiable information.
As your service provider, we believe this monitoring acts like an early warning system by helping to mitigate the effects caused by a breach. HMH Consulting will be here to help you in case of any breach related damage, but knowing about it early or preventing it altogether, is always a better launching point to ensure you are able to do what you do best.
We offer the online training packages to make your employees the front line of your cyber defence. The Phishing simulator email package can send your company up to Fifty different specific and tailored emails designed to simulate a phishing attack for real!
We then have the ability to know who and when the emails were opened and send your company and the employee the subsequent training packages to help educate and further the cyber understanding and protect your business.
Click Here for the latest reports on cyber breaches compiled by HM Consultants and Microsoft, detailing the cost and impacts on global Economics and businesses.
Trained in South Africa on the Ronin close protection course. We specialise in High Net Worth Clients, and celebrity protection. We understand and value the need for security to be part of the routine but also invisible and covert when required.
We use specially trained team members and ex Federal law enforcement officers for any protective detail and have the ability and training to cross the globe and protect what you hold dear.
We can facilitate surveillance of targets over extended periods and even run anti surveillance drills for our clients to ensure privacy when required.
We also offer a three-day surveillance package that would cover corporate needs for employees and operatives to be self-security aware. The package would be certified by the University of Carolina.
The security reviews come in three packages ranging from Silver, Gold and Platinum each being more detailed and more thorough then the last.
The Physical Assessments and penetration tests take between 1-3 days to complete (package dependant) and involves all aspects from emergency service response, building construction and fortification, alarms, back up power and employee movements before and after opening. The physical report would then outline any irregularities found and make recommendations to aid in the security of the business premises.
The Cyber Assessment can be tailored to suit the business requirements – we usually ask for a set amount of details to perform a ‘grey box’ penetration test this will include an external vulnerability assessment – conducted using industry leading tools to identify vulnerabilities, missing patches and unsupported operating systems (OS) on your public facing infrastructure i.e. firewalls and web-servers, routers etc this mimics the initial steps a potential hacker may take.
website security assessment looks at your domain to establish if there are any potential security failings, this includes indications if the flaws can be leveraged by an attacker.
web app vulnerability verification, hidden file discovery and more.
The pre-advanced and security clearance of venues for the entertainment and corporate client requirements, before the client arrives on site.
The protocols would include the existing venue security protocols but would tailor the needs and requirements of the client to ensure every aspect onsite is accounted for particularly the medical capabilities and any emergency medical requirements or evacuations.
The venue would also have an ever changing and adapted threat and risk profile created and maintained by the team leader of the protection detail.
Corporate security encapsulates a complete and thorough risk and threat assessment to establish what elements of and where your organisational resilience is at threat.
The conclusions from the assessment would be presented to the company and then be used to build and maintain your risk mitigation and management strategies.