Identify if you are being, or have been, attacked

Gain confidence as a one-off service or part of your annual security audit, with a tailored CORVID Compromise Assessment.

A CORVID Compromise Assessment will help you understand your estate, identify potential risks and compromises, and strengthen your security. It will also make you better equipped to protect your data, ensuring you meet the latest legal and regulatory obligations.

Using up-to-the-minute threat intelligence, alongside our in-house technology, each bespoke assessment is tailored to reflect your level of concern.

In the event an active breach is found, CORVID’s experienced cyber analysts will provide all the details and support needed for full system recovery, with no disruption to users.

Compromise-assessment_identify-compromise

Identify compromise

consultancy-shield

Demonstrate compliance

Compromise-assessment_weak-link

Ensure no weak links

Compromise-assessment_remediate-breach

Remediate active breaches

How it works

Typically run over a four week period, your bespoke assessment takes into consideration the nature of your infrastructure, likely risks and any incident history.

CORVID-Compromise-Assessment-diagram

New call-to-action

During the detection phase, CORVID’s skilled analysts will arrange weekly updates to let you know about any routine findings. If we identify something that looks actively malicious, we’ll contact you immediately to advise you of your options, to isolate the incident and enable swift remediation.

A Compromise Assessment identifies:

  • Unknown malware (droppers, trojans, worms, RATs, etc.)

  • Fileless compromise

  • Persistent back doors, which allow attackers to maintain a foothold in your network

  • Potentially unwanted programs (PUPs), which can increase your attack surface

  • Shadow software, which is installed without approval and not covered by company security protocols
  • Malicious executables (through process and file analysis)

  • Hijacked processes and malware using advanced masquerading techniques

  • Lateral movement, which allows attacks to spread across your systems

  • Beacons which signal infection

  • Access to known dangerous sites

Download CORVID Compromise Assessment Redacted Report

Once your assessment is complete, our analysts collate the results into a comprehensive, business-focused report, with coherent details of analysis areas, findings, and any remediation advice. This gives you a platform to articulate the effectiveness of your cyber security to stakeholders and the wider business, and highlight any areas for improvement. It also allows you to demonstrate the effectiveness of your security measures to your customers and supply chain.

Your assessment findings are 100% confidential – you will be allocated a unique identifier which is used as the only reference for your CORVID records.

Considering an acquisition or merger?

No matter how secure your systems are, linking with a poorly protected system gives attackers an easy route into your IT estate. Minimise the risks unknown systems pose to your IT estate by commissioning a one-off CORVID Compromise Assessment for the system you’re linking with. This gives you peace of mind that any existing vulnerabilities are identified and fixed before they can cause damage to your estate.