Loading...
Image is not available
Image is not available
Image is not available

True-Risk Driven Security

True-Risk Driven Security

Be Verum Secure

Be Verum Secure

Image is not available
Image is not available
Image is not available

Ready to find your true risk

Ready to find your true risk

Image is not available
Image is not available
Image is not available

Convinced?

Convinced?

Arrow
Arrow
Slider

OUR SERVICES

We offer a full range of repair services provided by an experienced and specialized team.
  • vCISO

    vCISO

    Adding a full-time Chief Information Security Officer (CISO) can be very expensive for businesses of any size. Yet, many of such businesses do not need full-time cybersecurity executive leadership; what's required is an...

    Read more

  • Penetration Testing

    Penetration Testing

    Penetration testing is a technical validation process used for identifying weaknesses in systems security and to determine if discovered weaknesses could be exploited by an attacker. It is an established risk management...

    Read more

  • Compliance

    Compliance

    Verum Security Compliance service delivery simplifies the compliance process. We use simplified methodologies to assess your current state and assist with the remediation of any gaps impacting your adherance to...

    Read more

  • Managed Services

    Managed Services

    Many organizations do not have IT Security resources to support all aspects of a fully functional IT Security program. Businesses want to focus on their core competencies, allowing them to be more strategic with their investments...

    Read more

Let our 15+ years of experience work for you!

CLIENT REVIEWS

Air Diffusion Systems, Gurnee, Illinois

Air Diffusion Systems, Gurnee, Illinois

I have worked with members of The Verum Security team for over 15 years. I am continually impressed by their professionalism and technical expertise....

Read more

Eudox Systems, Deerfield, Illinois

Eudox Systems, Deerfield, Illinois

We are developing applications for financial services industry, and our clients are regularly examined and audited by state and federal regulators. To maintain our product security...

Read more

FACTS AND NUMBERS

0
SKILLED CONSULTANTS
0
YEARS EXPERIENCE
0
FINISHED PROJECTS

LATEST FROM OUR BLOG

verumsecurity - Bad Rabbit
January 30, 2018 627

Bad Rabbit

in Blog by Super User
A couple of weeks ago, a variant of ExPetr/Petya ransomware, dubbed “Bad Rabbit” surfaced. It shares a significant share of its code with its more destructive predecessors, which suggests that authors may be the same or at least, they “borrowed” code from original authors. This time, attacks have been observed mostly in Russia and Eastern Europe, as well as Turkey, Germany. It is interesting that targets were Russian as well given that Russian groups do not attack their own; very likely out of “patriotism”. This group, either, is not Russian or they are trying to obfuscate their tracks. In any event, it is still not clear who is behind Bad Rabbit. Learn more...
verumsecurity - How to spot a PHISH
Jan 30, 2018 478

How to spot a PHISH

in Blog by Super User
Phishing is the ultimate social engineering attack. Email phishing attacks are typically fraudulent email messages appearing to be sent by a legitimate source such a company help desk, bank, credit card provider. These emails usually will direct you to a maliciously crafted web site or otherwise get you to divulge private information, e.g., password, credit card number, SSN, etc. Phishing gives a hacker scale and the ability to go after hundreds or thousands of users at once. Moreover, proliferation of phishing kits, which trade between $2 and $10, enabled spammers with little or none technical skills to execute phishing attacks with ease. According to Anti-Phishing Working Group, phishing attacks grew 250% in Q1 of 2016; the largest ever spike in 3 month span since… Learn more...

 

REQUEST A FREE QUOTE

Get answers and advice from people you want it from

 

Verum-bottom-impressum

verum logo footer grayMany businesses believe that data breaches happen only to big Fortune 100 companies. But that cannot be further from the truth. Every business has data that someone wants. Contact Verum Security for a FREE initial threat and risk assessment facing your business.

OUR CERTIFICATES
 
verumsecurity - cisa verumsecurity - gmob
verumsecurity - gwapt verumsecurity - cissp