Vulnerability & Scanning
Vulnerability Scanning is an assessment and process of identifying, quantifying, and prioritizing the vulnerabilities in a system. Digitpol is accredited in performing controlled vulnerability scanning to discovery flaws, cyber espionage, risks and apply immediate fixes.
Network Vulnerability Testing
Digitpol Cyber Security and Forensic experts specalise in analysis of LAN packet data and the testing of LAN networks, such security audits of a local network can be performed locally, onsite or at clients premises or via VPN. Testing of LAN networks will discover malware, bots, rogue devices, traffic to rouge sources, data leakage, unauthorised PC or devices and vulnerabilities.
Network Vulnerability / Penetration testing
Digitpol Cyber Crime Team specialist in network penetration testing aiming to identify network security flaws that allow for hacking, extorting, exploits, bad policy configuration, hardware vulnerabilities, modified DNS settings, rogue devices on the network, re-routed traffic, interception, active surveillance and more.
In addition to network analysis, we include RF site surveying, WiFi network scan and analysis. Once we have completed an assessment we offer flaw fixing and troubleshooting, often when needed, we provide the installation of secured wireless network hardware and connectivity.
We perform Surveys to record all Wi-Fi networks on the 2.4GHz and 5GHz spectrum to determine what devices are on your network and if any rogue devices are present.
Should I Be Concerned who’s on my WiFi?
Are you concerned about information loss or business secrets being targeted over WiFi? A small amount of information could be worth millions to the right people or could damage important negotiations. Loss of confidential information such as theft of data, hacking incidents, leaks and executive schedules could even put lives in danger.
WiFi networks are a common focus point for hackers. To ensure all is in order, our forensic team will conduct a forensic audit on your Wi-Fi network to detect any rogue or unauthorised devices. We will detect all connected devices on your network or Wi-Fi, Detection and Intrusion, Malware or unauthorised devices monitoring data traffic. Detection of infected PC's, phones, tablets and digital devices.