Cyber and IT Security Tests

On this page we provide more information about our services in the field of cyber and IT security testing. With these services we can conduct investigations for you in the field of vulnerabilities, ransomware, online security, phishing, online intelligence, and breaches.

Scans, Pen-tests & Phishing-tests

We conduct investigations and tests in the area of intrusion into websites and computer systems. We can also investigate the phishing resilience of employees. And of course we can investigate your organization to assess the resilience against ransomware. Then you will then know what the vulnerabilities are and whether the security measures are working effectively.

How resilient are you to ransomware?

OSINT, Social Engineering, Red-teaming

All kinds of information can be collected through the Internet, Social Media, phone, Instant Messaging and even people themselves. Think of personal data, but also financial and other sensitive data. These data can even lead to a physical break-in into your organizations. We can investigate for you what may have been leaked, where it happened, and what you can do about it.

How much data do you leak unknowingly?

Scans, Pen-tests & Red-teaming

Below you will find an overview of our services with regard to vulnerability scans, penetration tests and phishing-tests. After all, you are at the right address when it comes down to researching the security of your IT and employee.



Do you have a website, email environment, cloud service or IT infrastructure that you want to have security scanned or tested? We can carry out a vulnerability assessment and pen-test for you, in which we will investigate whether the ingredients for the recipe of a hack or data-leak exists. Based on the findings, we also help to enable you to remediate the issues that have been found.

Ask us today to execute a test to investigate the overall security of your environment.



Would you like to know whether a specific security measure, website or IT infrastructure can be breached? To answer this question we can perform a pen-test. A vulnerability scan is primarily automated, but with a pen-test we ourselves will use manual tools. We will use various hacker techniques based on OWASP to test whether or not the subject can be breached.

A pen-test continues where a vulnerability scan ends. We test the resilience using manual hacker techniques.


Helping employees become resilient to phishing attacks is crucial. More than 90% of all data leaks, ransomware attacks and digital breaches start with a phishing email. We help to make your organization resilient with the help of a phishing test. Based on this, you can determine which employees or teams need extra support. We can also help with phishing training.

Phishing testing helps your employee to become resilient to emails that can harm your organization.

Would you like to know more about our services? Then contact us by phone. Or just send us an email and we will contact you as soon as possible.

OSINT, Social Engineering & Red-teaming

Finding information via the Internet, social media and people themselves is something we are trained and experienced in. People unknowingly leak more data than they think and want. And can even lead to a break-in into one of your buildings. We can investigate that for you. You can read more about this below.

Open Source Intelligence

Open Source Intelligence (OSINT), and Social Media Intelligence (SOCMINT) are research methods for collecting information from public sources. Think of the Internet, Social Media, the library and other forms of publicly available information. This can go from a “due diligence” investigation to finding fraudsters active on your web store.

Would you like to have a thorough online investigation and want to learn more about what can be found online? Then we would like to hear from you.

Social Engineering

Social Engineering is the practice, or actually art, of getting information from people. A Social Engineering test can be very useful to test whether your awareness campaigns actually work. Does your HR department just pass on Social Security numbers by phone? Or does your IT engineer tell you if there are any issues? We will look into that for you!

We can investigate this often unknowingly way of leaking data and that helps you to give a boost to your awareness training.


We can also carry out so called Red-teaming tests. In short, this means that we will test the security measures of your organization as a whole. This can be the guard at the entrance, right down to entrance gates at the data center. With the use of OSINT and Social Engineering we look at how far we can get to breach your organization. Finally, we help you to define solutions for vulnerable areas we have found.

Red-teaming is the challenge for your set of security measures for people, process and technology!

Would you like to know more about our services? Then contact us by phone. Or just send us an email and we will contact you as soon as possible.

• • •