Common Objections and Rationalisations: “Our production systems are completely isolated from outside access.” “Our system is secure because it would be impossible for an outsider to understand it.” “We’re not a likely target. We’re not important or interesting enough to attract hackers.” “We’ve never had a problem. There has been no intrusion or disruption in our production network.” “It hasn’t happened yet, so it seems unlikely. I don’t think it will happen.” “We can’t justify the expense and manpower.” Being Vulnerable is not your fault. Staying vulnerable definitely is... Cyber Security is much more than a matter of IT... Passwords are like underwear: Don’t let people see it, Don't leave them lying around and Change them regularly... It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.. Technology trust is a good thing, but control is a better one... No technology that’s connected to the Internet is unhackable. Social engineering bypasses all technologies, including firewalls. Phishing is a major problem because there really is no patch for human stupidity. If you think you know-it-all about cybersecurity, this discipline was probably ill-explained to you. My message to companies that think they haven’t been attacked is: ‘You’re not looking hard enough. Never underestimate the determination of a kid who is time-rich and cash-poor. Time is what determines security. With enough time nothing is unhackable. Data is the pollution problem of the information age, and protecting privacy is the environmental challenge.

Follow On Social

  • Investigation Code:

    C S C S

  • Project

    Consulting Services

  • Date

    August 20, 2022

How to apply military strategy to your incident response plan—the OODA Loop:

  • Observe
  • Orient
  • Decide
  • Act

SecOp Consulting Services List: About Us

We use every possible weapon in the hacker’s arsenal to test your limits and break down your defences, so you know exactly where the vulnerabilities lie. We’re not a red teaming agency, or a penetration testing consultancy. We're an unstoppable onslaught that brings together every element of cyber security testing.

Discover the best way to advance your security program, controls and operations. Take advantage of proven SecOp services, customised for your needs. Learn more about the service below and consult one of our experts to determine the right solution to achieve your goals.
Our team specialises in a proactive approach that goes beyond traditional penetration testing, with a comprehensive cybersecurity program that simulates constant cyber attacks against your business, to identify and remediate vulnerabilities.



Have Questions?

SecOp Logo