Red team services are carried out in four stages.
Firstly, reconnaissance is carried out to gather as much information about your organisation as possible.
Then, we leverage our intelligence to launch a simulated attack on your organisation. This could include techniques such as email phishing, physical ingress, or Command and Control techniques, to gain access to your network.
Once we have established a foothold, we aim to achieve the agreed objective of your red team assessment; for example, data exfiltration.
Finally, we provide you with clear reports of how well your organisation is performing at each phase of the assessment.