EliteSec Cyber Security Consultants, Inc.

EliteSec Cyber Security Consultants, Inc.

Computer and Network Security

Cambridge, Ontario 156 followers

Pragmatic cyber security solutions designed for your unique needs.

About us

EliteSec offers comprehensive penetration testing services, which involve simulating cyberattacks to identify vulnerabilities in their clients' networks, systems, and applications. By proactively seeking weaknesses, they help clients strengthen their defenses and prevent potential breaches. EliteSec can help test web and SaaS applications, internal/on-prem networks, wi-fi networks, mobile applications, and cloud deployments. We pride ourselves in our easy-to-read reporting, deep coverage, and ensuring you have a clear path to resolution for any findings during testing.

Website
https://elitesec.io
Industry
Computer and Network Security
Company size
2-10 employees
Headquarters
Cambridge, Ontario
Type
Self-Owned
Founded
2018
Specialties
cybersecurity, penetration testing, vciso, virtual ciso, security program, security consulting, and cybersecurity consulting

Locations

Updates

  • John's writing a book! Come read about our other major offering outside of Penetration Testing!

    View profile for John Svazic, graphic

    Cybersecurity Consultant | Penetration Tester | Speaker | Trainer | Conference Organizer | Offering pragmatic advice and candid discussions about cybersecurity to Scale-ups and SMBs.

    I post a lot about #cybersecurity, specifically #penetrationtesting, but did you know that we also offer gamified #tabletop exercises? These are scenario-based exercises for organizations to practice dealing with a disaster, such as a ransomware outbreak, shutdown due to weather (blizzard, etc.) or major outage in a data center. Think of it as a fire drill for a disaster recovery plan. I came up with the idea for adding a gamified element to the traditional tabletop exercise to make it more fun and relatable, (h/t to the fine folks @Axonify for the idea), and now I'm proud to announce that I am writing a book on building gamified tabletops! I'm still very early in the process, but I am hoping to bring my experience in building and running gamified tabletops for the past few years to a wider audience. Personally I feel that documentation on tabletop design isn't really available outside of snippets in some books and random blog articles around the internet. That and I know nobody does it quite like I do. :-) If you are looking to test your disaster recovery plans to maintain your #SOC2 or #ISO27001 compliance, and you're looking for something more engaging, by all means let me know. We can go through a quick discussion on how gamified tabletops are different and how we can help prepare your own organization for the unexpected.

  • EliteSec Cyber Security Consultants, Inc. reposted this

    View profile for John Svazic, graphic

    Cybersecurity Consultant | Penetration Tester | Speaker | Trainer | Conference Organizer | Offering pragmatic advice and candid discussions about cybersecurity to Scale-ups and SMBs.

    I'd like to talk about a specific type of penetration test that I feel a lot of organizations overlook, that I think should get a second thought. Specifically I'm thinking of the internal network penetration test. What is it? This is the type of penetration test that checks for weaknesses within your offices on your "trusted" network, be that on a local wi-fi network or a dedicated office network that's accessed via a VPN. So why is this important to test? Are attackers going to break into your office space and take over your CEOs laptop? Not likely, but if that's a possibility I'm sure you're already doing this type of testing! But seriously, what if you have a lot of visitors to your office space? What if you have a large customer base or some big-name clients that may be attractive to an attacker? Past breaches like SolarWinds are great examples of supply-chain attacks where the breached company wasn't the main target. A better question to ask is what happens when one of your staff gets compromised. What can an attacker do if they get credentials from a staff member, such as via phishing or a data breach because they re-use passwords? Or the recent trend in hackers calling in to help desks posing as an employee to reset their password and 2FA code? Understanding what an attacker may be able to do after breaching one of your employees is one of the first steps to ensuring you don't fall risk to the Cadbury cream egg problem; having a hard outer shell, but a delicious gooey middle. While I do have a few clients who perform internal penetration tests, most focus on their public facing applications. There's nothing wrong with that, but I would encourage folks to consider their internal networks as well. Sometimes it's those sections that are overlooked is where the real dangers lie in wait.

  • EliteSec Cyber Security Consultants, Inc. reposted this

    View profile for John Svazic, graphic

    Cybersecurity Consultant | Penetration Tester | Speaker | Trainer | Conference Organizer | Offering pragmatic advice and candid discussions about cybersecurity to Scale-ups and SMBs.

    Penetration testing takes many forms, from testing websites to full fledged SaaS applications hosted on the cloud. Then there's those pesky mobile applications that users are constantly clamoring for. Then there are those networks internal to your company that allow employees to work together and collaborate with. For those who are more likely to face a physical threat, physical penetration testing is another option at your disposal, but it's not for everyone. While we do not do physical penetration testing, we do handle the others. From Windows domains to remote VPNs, Android and iOS apps, Google, Azure and AWS cloud-hosted applications, we can help test your environment/application against industry defined best security practices. Feel free to reach out, I'd be more than happy to discuss what makes sense for your particular needs and how EliteSec Cyber Security Consultants, Inc. can help!

  • John talks about the importance of penetration testing, why companies perform penetration testing, and why it's important to pick a trusted partner for such an important piece of the #cybersecurity puzzle.

    View profile for John Svazic, graphic

    Cybersecurity Consultant | Penetration Tester | Speaker | Trainer | Conference Organizer | Offering pragmatic advice and candid discussions about cybersecurity to Scale-ups and SMBs.

    Why do companies seek a penetration test? In my experience, it normally boils down to 3 reasons: 1. They're trying to adhere to a compliance requirement such as PCI-DSS, ISO27001, SOC2, CIS Controls, etc. 2. They have customers requesting/demanding a report. 3. They want peace of mind. Penetration testing is one of those things that can make a significant impact to the security of your business network and/or product, but it's often overlooked due to the "mystery" behind what's involved. At EliteSec Cyber Security Consultants, Inc., we do a lot of SaaS and web-based penetration testing. Our methodology revolves around the OWASP® Foundation's Web Security Testing Guide (https://lnkd.in/gnh4NQs7) to ensure we're using an industry standard set of checks. There isn't much mystery in what we're doing during our testing, and we always ensure our customers understand any findings, including detailed steps to reproduce each finding, as well as remediation options to repair any findings. We can speak with developers, and provide risk ratings based on tailored CVSS scores for each finding. The goal of a penetration test isn't to get a "high score" for the penetration testers, nor should it be a piece of paper to get a compliance stamp for the client. It should be a realistic view of the risk for the project under scope in terms of what harm a malicious actor could cause for a company if exploited. Clearly there are other benefits, but from a penetration testing vendor's perspective, they shouldn't be the only focus. When selecting a vendor to perform penetration testing, be sure to pick someone who you can trust and who has your best interests in mind. Spending time trying to fix a low-risk issue because someone marked it as critical without telling you why doesn't help anyone. All the compliance in the world won't help if you have exploitable vulnerabilities in your company's infrastructure/product, because malicious actors don't care what the auditors signed off on.

    Table of Contents

    Table of Contents

    owasp.org

  • EliteSec Cyber Security Consultants, Inc. reposted this

    View profile for John Svazic, graphic

    Cybersecurity Consultant | Penetration Tester | Speaker | Trainer | Conference Organizer | Offering pragmatic advice and candid discussions about cybersecurity to Scale-ups and SMBs.

    It's that time of year again! As the holiday's fast approach, so do budget deadlines and plans for 2024. Have you budgeted your annual penetration test yet? Perhaps you weren't thrilled with your provider this year and are looking for someone new? EliteSec can help. We offer comprehensive penetration testing services for your applications/networks and provide exceptional reporting to assist with remediation. Did I mention we offer 5 free re-tests for findings for up to 12 months? Perhaps you're not ready for a full change of vendor, but you would like a second opinion on your report because it just doesn't seem right or makes sense. We'd be happy to review the report (under NDA of course) and offer our honest opinion. If you're interested, please reach out. I'd be more than happy to share a sample report so you can compare. Wishing everyone a safe and uneventful holiday season!

  • Our Founder and Principal Consultant has some thoughts on penetration testing and how EliteSec offers a thorough service in terms of using industry standards for our engagements to ensure a higher level of quality for our clients.

    View profile for John Svazic, graphic

    Cybersecurity Consultant | Penetration Tester | Speaker | Trainer | Conference Organizer | Offering pragmatic advice and candid discussions about cybersecurity to Scale-ups and SMBs.

    Penetration Testing (commonly called pen testing), is our main focus at EliteSec, and we're proud of our process and reports provided to our clients! We use the OWASP Testing Guide, an open standard for testing web-based applications. As most of our pen tests cover SaaS applications and offerings, this is a great standard to work with. It also slots nicely with mobile applications, as the API calls to a back-end server are similar. For network pentests, we use the Pen Test Execution Standard (PTES) as our blueprint for testing to ensure we are following standardized methodologies designed by trusted experts to ensure comprehensive coverage. But why? Quite simply, we don't want to overlook something. Some firms will use their own checklist or methodology that is often less comprehensive, or it focuses on more recent threats as opposed to the common ones that make up well known lists such as the OWASP Top 10 for web-based applications. While modern threats are important, they are not always as common or as long-lasting as some folks may believe. There's a difference in having a bug in the way a component is coded versus a vulnerability in a 3rd party library. You should check for both, but being exclusive in checking for "headline generating" vulnerabilities isn't the right approach for your customers. Check for both. Our experience at EliteSec is that we've seen the "classic" OWASP Top 10 vulnerabilities across different verticals, from SQL injection to cross-site scripting (XSS), even some examples of XML External Entity (XXE) vulnerabilities that allowed us to extract data from a Docker container, not to mention other issues. Most modern frameworks protect against these types of vulnerabilities, unless they're mis-configured. That's why we test, and that's why having a standard to test against is important. Penetration testing is normally done to test the quality of an application from a security perspective. It is often required by potential customers who want assurances from the vendor that their software is designed to provide protection for the data provided by the customer that is entrusted to the vendor. These customers often ask for proof of such testing. Compliance frameworks such as PCI-DSS and even some SOC2 auditors are looking for penetration testing reports to complete the certification. There are even times when a CEO may request the testing for peace of mind due to a competitor or some other organization they have read about being compromised and customer data being lost due to a flaw in their application. Regardless of the reason, penetration testing can help. Not all penetration testing firms are created equal. Ask for sample reports, methodology, and feedback from customers if there are no reviews available online from an independent source. Pen testing is an investment in time, money, and resources, so you should receive a report worthy of all three. Let us know if you have questions, we'd love to help.

  • EliteSec was founded on the idea that good security services, specifically around penetration testing, should be both affordable and useful to companies of any size and technical aptitude. Our founder has witnessed first-hand what a bad pentest report looks like, and the harm it can cause. From poor explanation, to literally copy-and-pasting a finding and charging close to 10x the cost of the software that generated it. Our mission is to ensure our customers are getting modern, practical advise for their organization and products they offer to clients. Our motto is pragmatic advice with candid discussion. We don't use cyber-specific lingo to sell services, but we do follow industry standards, such as the OWASP Testing Guide as the basis for our testing, in order to deliver top-notch services to our clients. SMEs and SMBs have been known to go under due to a cyber incident. We want to raise the bar for everyone to ensure that doesn't happen to you. Our passion is cybersecurity, be it through testing, training, or advising. No one deserves to be a target, let alone a victim. Our goal is to ensure that you, and your customers, are not impacted due to a vulnerability in your software, infrastructure, or security program. We are here to help, just let us know what concerns you or if you have any questions.

Similar pages

Browse jobs