cybet_dator

IT security services

Basalt has extensive experience in information security and IT security. Through penetration tests, we can test your IT environment and systems to achieve the level of security your organization needs.

Here's how we can help you

Our experts can conduct many different tests of your systems, devices and employees to see what your resilience actually looks like. You can read more about some of these tests below.

Known vulnerabilities in web applications are often an easy way into a company’s internal infrastructure. We test and review potential vulnerabilities that you didn’t know existed and make recommendations on how these should be fixed.

Infrastructure penetration testing involves looking for vulnerabilities in all components connected to the client environment, which includes switches, servers, printers, clients, routers, IoT and OT equipment.

We carry out tests of the company’s mobile devices as well as the networks and systems to which they are connected. In testing, our experts look for weaknesses as we bypass security checks and simulate real attack attempts.

Pentest by OT focuses on the systems and networks used to control and monitor industrial processes and critical infrastructure. These systems can include SCADA systems, PLCs, and other types of industrial control systems.

Our experts are certified and have extensive experience in forensic investigations and digital evidence collection. Using proven methods, we investigate and test various hardware that has been exposed to intrusions. After gathering evidence, we ensure that no back doors remain.

In social engineering tests, employees’ knowledge and abilities are put to the test. The human factor is a common reason why IT attacks often occur. Through phishing campaigns with emails, phone calls or attempted physical intrusions, we try to access sensitive information.

In social engineering tests, employees’ knowledge and abilities are put to the test. The human factor is a common reason why IT attacks often occur. Through phishing campaigns with emails, phone calls or attempted physical intrusions, we try to access sensitive information.
Client tests

A physical penetration tester is physically present at the client’s location and tries to gain access to the physical premises. After a successful breach, the physical penetration tester continues to compromise systems and networks, or collect other sensitive data.

Does your organization need external resources to train new and existing staff in IT security? Our experts have extensive experience in working with companies that have the highest security requirements. We adapt the training according to your wishes, so that the entire organization can achieve the security requirements that are set.

Do you suspect that you already have an ongoing breach in your systems? Don’t worry, our IT security consultants will help you take control of the situation. Contact us directly and we will help you find out what happened

Are you under attack right now?

Forensics and incident management

When something happens in your IT system, it is important to keep a cool head and act according to set protocol. Basalt’s experienced incident handlers make a collective assessment of alarms, indicators and incidents with a focus on IT security. We present a report, determine its severity level and then communicate according to an agreed process to the correct system. Basalt’s incident handlers have extensive experience in forensic investigations and have previously been part of various Computer Security Incident Response Teams (CSIRTs). 

Do you suspect you are under attack right now? We can help you take control of the situation. Contact us directly and we will get back to you immediately.

Identify the weak point of the IT system

Penetration tests (pen test)

Basalt’s IT security experts help you identify IT system vulnerabilities and review IT security for your business based on your needs and requirements. Among other things, we help with penetration tests, vulnerability scans, evaluations of systems and recommendations on measures to increase security. Our consultants also check that the security level of your IT system is correct and adapted to your business according to laws and regulations.

Realistic attacks against your organization

Red team

In IT security, Red team is used as a method to measure organizations’ resilience and ability to handle digital and physical attack attempts. A Red team challenges systems, technology and employees through realistic attacks. Here, the organization’s detection and reaction capabilities are tested and attempts are made to access sensitive information. Since an attacker does not necessarily know exactly how to access the sensitive information, several different approaches are used.

Through as realistic attack attempts as possible, the organization’s ability is put to the test – for real.

Get help from certified IT security experts

Competent consultants

Our IT security consultants have several certifications in IT security. It is important for us to guarantee that we can do what we promise. Our consultants have extensive experience in working with customers who have the highest security requirements. We find vulnerabilities that others miss.

We value competence development and therefore participate annually in several IT security conferences where our employees can put their knowledge to the test, undergo training and learn about the latest in IT security. New threats are added all the time, therefore it is just as important that our consultants learn about new vulnerabilities, as it is that organizations regularly look for these in both the IT environment and IT systems.

A presentation by Fredrik Sandström

How to Hack ATMs

During the IT security conference SEC-T in September 2023, Fredrik Sandström, our senior consultant in IT security, gave a talk on how to go about penetration testing ATMs.

cybet_dator

5 tips to protect your systems against an attack

Download our guide

Make it harder for an attacker to succeed in their attack. Download our free guide with 5 concrete tips on how to protect your business against attacks.

  • Get tips and inspiration from Basalt
    Subscribe to our newsletter

Required field
banner-3--data

Stay one step ahead.

Let Basalt be responsible for your operational protection.
Contact us and we will guide you right!