A Red Team Exercise is an all-out attempt to gain access to a system by any means necessary, and usually includes cyber penetration testing, physical breach, testing all phone lines for modem access, testing all wireless for potential access, and also testing employees through several scripted social engineering and phishing tests.
These are real life exercises carried out by an elite small team of trained professionals that are hired to test the physical, cyber security, and social defenses of particular system.
Often, clients are not always in control of all aspects of the security of their systems. Whether this is outsourcing physical security, cyber security monitoring or even using contractors and outside firms for securing IT systems.
Since all it takes is the weakest link for a security breach to occur, it is important to test all facets of a security program to determine where the breaking points exist. For this reason, we advocate using a Red Team Exercise to mimic the same process that a motivated attacker would follow to map out an organisation’s infrastructure, perform reconnaissance at key physical installations, and then test the physical, cyber, and social defenses all at once through a staged exercise.
We have the resources, methodology, and experience to perform these tests in a safe manner that does not impose any operational risk to our clients.