A CORVID Compromise Assessment will help you understand your estate, identify potential risks and compromises, and strengthen your security. It will also make you better equipped to protect your data, ensuring you meet the latest legal and regulatory obligations.
Using up-to-the-minute threat intelligence, alongside our in-house technology, each bespoke assessment is tailored to reflect your level of concern.
In the event an active breach is found, CORVID’s experienced cyber analysts will provide all the details and support needed for full system recovery, with no disruption to users.
During the detection phase of the compromise assessment, CORVID’s analysts will arrange weekly updates to let you know about any routine findings. If we identify something actively malicious, we’ll contact you immediately to advise you of your options, to isolate the incident and enable swift remediation.
Once your compromise assessment is complete, our analysts collate the results into a comprehensive, business-focused report, with coherent details of analysis areas, findings, and any remediation advice. This gives you a platform to articulate the effectiveness of your cyber security to stakeholders and the wider business, and highlight any areas for improvement. It also allows you to demonstrate the effectiveness of your security measures to your customers and supply chain.
The findings of your compromise assessment are 100% confidential – you will be allocated a unique identifier which is used as the only reference for your CORVID records.
Threat hunting involves actively seeking out cyber threats that have already breached the infrastructure. Threat hunters create hypotheses from data on new threats, combining this with insights into adversary tactics. They use threat intelligence to reveal potential and ongoing attacker activities, applying advanced analytics to detect suspicious behaviours amid the vast data collected by security systems. This is an ongoing process and one which our MDR service does exceptionally well.
In contrast, a compromise assessment is typically performed periodically, often quarterly or monthly, for point-in-time analysis and sometimes to meet regulatory requirements. The scope of a compromise assessment is broader than that of a threat hunt—it examines not only indicators of compromise and attack but also investigates their causes, outlines necessary next steps, and suggests actions to enhance the organisation's overall security posture.