Network and application penetration testing for your business. Our experienced team are discreet and effective at finding weaknesses before the bad guys do.
Our experienced social engineers can test your companies processes, policies, staff and security, both physical and electronic.
We offer a wide range of covert solutions for you or us to deploy in your business. We offer full support, training and advice with all of our solutions.
We work with you to create a bespoke training package for your staff to keep them abreast of the latest threats to your business and how to keep it safe.
Hexode Security Solutions was formed back in 2012, by a team of specialists from a broad range of security backgrounds. With skill sets in covert and overt security solutions, penetration testing, social engineering plus much more we are at the top of our game and here to provide you with solutions.
Based in Greater Manchester and provide remote as well as onsite consultation, support and training solutions to our clients nationwide.
Percentage of Phishing emails opened in 2016
Percentage of adults suffering a security breach in 2016
Theft of intellectual property increase 2015 to 2016
Percentage increase of ransomware 2015 to 2016
Articles from our blog
What is phishing? First of all, what is phishing? We hear the term branded about daily by the media but what does it actually refer to? Phishing is the fraudulent method of sending emails, purporting to be from someone trusted by the recipient in order to deceive them. This can be an email that appears Read more about How to avoid falling victim to a phishing scam[…]
What is Dazzle? Well the dazzle technique is nothing new, it was used in World War I to camouflage navy ships from enemies. It isn’t used to hide like you may think with traditional forms of camouflage it is used more to obscure judgement. It made it hard for the opposition to decide on the Read more about CV Dazzle[…]
What is the threat? One of the biggest threats facing businesses and home users through 2016 and 2017 is ransomware. If ransomware takes hold of a computer or a network the consequences can be catastrophic. Ransomware works by encrypting all documents it finds. It starts by encrypting the users documents on the machine that is infected, Read more about Ransomware[…]
Organisations seem to sit in three categories when it comes to information security. The smallest of these categories is the one where the company has a firm grasp on security. They are aware of the risks and devastation a breach could cost them, they have identified a need for training and education of staff and Read more about An education in flashing lights[…]
As a business in 2017 should you hire a hacker? Let’s first look at crime advice for physical buildings, homes, businesses, etc. You can get a security advisor, someone who is associated with the local police department who specialises in how to protect your home. They may advise you fit an alarm, some CCTV cameras, Read more about Should I hire a hacker?[…]
So the biggest threat as a whole in 2016 was definitely Ransomware. But what does the threat landscape in 2017 look like? As we saw towards the end of 2016 the latest trend appears to be IOT based botnet attacks to create DDOS attacks. Ransomware Ransomware is big business, money can be made from the Read more about The threat landscape in 2017[…]
We have been hard at it here at Hexode Security Solutions this week. Our office is going through a bit of a revamp. We offer several services to our clients, most of which takes place at our client’s sites. However, we also need a place to work on projects, monitor clients remotely and a space Read more about Office Upgrade[…]
How does a cyber criminal get rich? It isn’t a quiz question, it’s a serious consideration, one which we need to understand. If we don’t understand what methods are used, what lengths they will go to we are going to be caught completely unaware. Ransomware was very popular in 2016, it was the buzz word Read more about Data Manipulation[…]
Artificial intelligence in the realms of information security is no new concept. It has been something that has been used in a defensive capacity for many years. It can perform tasks that humans can’t, spot behaviour patterns, adapt it’s way of detection based on how threats are evolving or based on baseline “normal” data. AI Read more about Artificial Intelligence[…]