Skip to content

Salus Cyber

Third
line of defence

Ransomware Attacks

Ransomware is on the rise

Avoid this disruptive, costly threat

Controls, attack vectors and mitigation...

The tri-factor of reducing the likelihood of being a ransomeware victim, or at least severely diminish the impact of such a cyber attack.

Salus Cyber focus on prevention by understanding the context of your business strategy and systems, building in verification procedures, recommending detection markers and detection response actions.

Randsomewear Attacks

Not 'just malware'

Cutting-edge custom payloads and attack vectors written as threat actors without the malicious element. Salus Cyber will never run 'just malware' on your system and tell you that “you’re vulnerable”.

Bespoke design

Choose your features. Plug and play modular design allow completely custom attacks, based on your threat intelligence, key risks, or gut feelings.

Scalable + Repeatable

The test can be used as part of ongoing developments, security improvement projects or as part of international IT exercises.

Safe + Controlled

Whilst malicious in appearance and behaviour, no actual damage or harm will come from using the assessment.

More Third line of defence services

Red Team

Learn more

Consultancy

Learn more

How we work

Customer Journey

  1. Identify

    First, we take time to familiarise ourselves with your business. This allows us to clearly understand your requirements, your business risks, your key pain-points, and the outcomes you’re looking for.

  2. Understand

    We turn those requirements into crystal-clear scoping and test plan documents, so you know precisely what we’ll be doing, when we will be doing it, and how we will do it.

  3. Test

    We deliver what we promised.
    Simple.

  4. Inform

    Every report we create is unique based on your business, we don’t use cookie cutter data for our summaries or our remediation plans. Our precise and concise findings brief will advise what steps your business needs to take next to reduce cyber risk.

  5. Remediate

    We can ensure that the remediation process is tracked and coordinated within your business, we will allocate resources to point you in the right directions or if you need our help directly with remediation, we’ve got you covered.

  6. Feedback

    Your opinion is important to us, so we send a questionnaire to every one of our customers after each project – so you can let us know how we did.

Request a call back