hedgehogsecurity.co.uk
Open in
urlscan Pro
23.227.38.65
Public Scan
URL:
https://hedgehogsecurity.co.uk/
Submission: On September 09 via automatic, source certstream-suspicious — Scanned from DE
Submission: On September 09 via automatic, source certstream-suspicious — Scanned from DE
Form analysis
4 forms found in the DOMPOST /cart
<form id="cart-drawer-items" action="/cart" method="post"></form>
POST /cart
<form id="cart-drawer-summary" action="/cart" method="post" class="cart-summary-mobile"></form>
GET /search
<form role="search" method="GET" class="search-form" action="/search">
<div class="search-form__wrap">
<div class="container">
<p>What are you looking for?</p>
<button type="button" class="search-form__close" id="CloseSearchOverlay" aria-label="Close Search Form"><svg xmlns="http://www.w3.org/2000/svg" width="19" height="19" viewBox="0 0 19 19">
<path d="M19.7.7L19 0 9.9 9.1.7 0 0 .7l9.1 9.2L0 19l.7.7 9.2-9.1 9.1 9.1.7-.7-9.1-9.1z" fill="currentColor"></path>
</svg></button>
<div class="search-form__fields">
<input type="hidden" name="type" value="product">
<input class="search-form__input-text" placeholder="Search Products" aria-label="Search" autocomplete="off" type="text" name="q" onkeyup="this.setAttribute('value', this.value);" value="">
<button class="search-form__submit" type="submit" aria-label="Search"><svg xmlns="http://www.w3.org/2000/svg" width="16.26" height="16.259" viewBox="0 0 16.26 16.259">
<g transform="translate(0.75 4.301)">
<g transform="translate(0 -3.551)">
<path d="M69.911,64a5.911,5.911,0,1,0,5.911,5.911A5.911,5.911,0,0,0,69.911,64Z" transform="translate(-64 -64)" fill="none" stroke="currentColor" stroke-miterlimit="10" stroke-width="1.5"></path>
<line x2="4.128" y2="4.128" transform="translate(10.321 10.32)" fill="none" stroke="currentColor" stroke-linecap="round" stroke-miterlimit="10" stroke-width="1.5"></line>
</g>
</g>
</svg></button>
<button class="search-form__clear" type="reset" aria-label="Close Search" value="Reset" onclick="this.parentNode.children[1].setAttribute('value', ''); document.querySelector('.search-form__suggestions').innerHTML = '';"><span
class="cross-icon"></span></button>
</div>
<ul class="search-form__suggestions"></ul>
<div class="no-results">
<div class="no-results__message"></div>
<h3>How can we help?</h3>
<p>Looking for <strong>Penetration Testing</strong>?</p>
<p>Want to explore our <strong>Security packages</strong>?</p>
<p>Need Help? Call our friendly team for advice today on 0333 344 4256</p>
</div>
</div>
</div>
</form>
GET /search
<form role="search" method="GET" action="/search">
<input type="hidden" name="type" value="product">
<input class="search_box" placeholder="Search by keyword" aria-label="Search" autocomplete="off" type="text" name="q" onkeyup="this.setAttribute('value', this.value);" value="">
<input class="submit btn btn--small" type="submit" value="Search" aria-label="Search">
</form>
Text Content
This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy. We won't track your information when you visit our site. But in order to comply with your preferences, we'll have to use just one tiny cookie so that you're not asked to make this choice again. Accept Decline Your Basket Cyber security for any size of business CREST member company Team of friendly certified experts * Services * Penetration Testing * CREST Penetration Testing * GDPR and Data Protection * Legal Sector * Gaming Sector * What to Expect in a Pentest * Small Business Packages * Cyber Security Consulting * Buy 1 Hour Live Consulting * vCISO / Virtual CISO * Cyber Essentials * Vulnerability Scanning * Our Blog * Resources * Articles and Guides * Data Breach Search * Free Cyber Security Program * Free Website Security Assessment * About * Our Team * Contact Us * Cyber Security Internship 0333 344 4256 What are you looking for? HOW CAN WE HELP? Looking for Penetration Testing? Want to explore our Security packages? Need Help? Call our friendly team for advice today on 0333 344 4256 Services Penetration Testing CREST Penetration Testing GDPR and Data Protection Legal Sector Gaming Sector What to Expect in a Pentest Small Business Packages Cyber Security Consulting Buy 1 Hour Live Consulting vCISO / Virtual CISO Cyber Essentials Vulnerability Scanning Our Blog Resources Articles and Guides Data Breach Search Free Cyber Security Program Free Website Security Assessment About Our Team Contact Us Cyber Security Internship GET CYBER SECURE BEFORE CHRISTMAS Pentesting | Vulnerability Scanning | Cyber Essentials CHRISTMAS IS COMING SOON. ARE YOU CYBER SECURE AND READY FOR THE FESTIVE PERIOD? THE CRIMINALS ALREADY HAVE! WHAT WE DO Penetration TestingVulnerability ScanningCyber EssentialsIT Health Checks Join over 2,000+ happy customers PENETRATION TESTING Penetration Testing or Pen Testing is a technical review of your systems, your processes and sometimes your people. Penetration Testing is carried out to uncover vulnerabilities, threats and risks that an attacker could exploit in software applications, networks or web applications. Penetration Testing can be called many things. We commonly see pentest, pentesting and PENtest. They are all the same thing. We perform a number of different types and classes of penetration testing to help enable you to get the maximum return on your testing investment. You reduce your Cyber Risk with penetration testing, as well as protect your customers and your own information as well help maintain your reputation. HOW PENETRATION TESTING HELPS YOUR BUSINESS KNOW WHETHER YOUR CRITICAL ASSETS ARE AT RISK IDENTIFY AND MITIGATE COMPLEX SECURITY VULNERABILITIES BEFORE AN ATTACK CAN EXPLOIT THEM GET REALISTIC FINDINGS AND COMPREHENSIVE RECOMMENDATIONS UNDERSTAND HOW THE MOST SOPHISTICATED ATTACKERS OPERATE BASED ON INTELLIGENCE GAINED OVER 10 YEARS OF BEING IN BUSINESS PENETRATION TESTING DETAIL Our penetration tests leverage deep knowledge of attacker’s behaviours and methods. We use the same tools, tactics and procedures (TTPs). Every test is custom built to every client’s needs and requirements. We assess specific aspects of the security program and the state of security of systems, networks and applications within the scope. We set modern, realistic goals for our talented penetration testers to attempt to achieve. These are the same goals that actual attackers would have in place to justify their time and investment in their attacks. We have some pre-built testing packages for web apps, mobile application, external infrastructure, internal penetration testing, IoT device testing but if you need something more bespoke and in-depth, Hedgehog can help. More Information Pentest Packages Join over 2,000+ happy customers VULNERABILITY SCANNING The Hedgehog Vulnerability Scanning service is here to help you protect your external infrastructure, keeping your business and your data safe. The vulnerability scanning service is fast and easy to use. Using our external vulnerability scanning service will enable you to: HOW VULNERABILITY SCANNING HELPS YOUR BUSINESS SCAN FOR THOUSANDS OF VULNERABILITIES IN YOUR FIREWALL AND EXTERNAL-FACING SERVICES, HELPING YOU SEE EXACTLY WHAT CRIMINAL HACKERS CAN SEE; IDENTIFY ALL THE WEAK SPOTS THAT NEED ATTENTION THROUGH DETAILED REPORTS; ACT QUICKLY TO FIX YOUR SECURITY WEAKNESSES BEFORE CRIMINAL HACKERS FIND AND EXPLOIT THEM; PROTECT CUSTOMER DATA AND YOUR BRAND REPUTATION. HOW WE RUN VULNERABILITY SCANS Our scanning service is very simple to use. You simply log into our scanning platform (access will be provided following your purchase) and enter your IP addresses or URLs. If you would like to use the scheduler, you can choose the time and date you want your scans to run. Once the scans are completed you can view your reports online. If you need to rerun your scans, you can do this direct from the scanner interface whenever you need to. 3 TYPES OF SCANNING We have three different levels or types of vulnerability scanning available. The standard vulnerability scan is our foundation service at £8 per asset scanned. Our Advanced service removes 99% of all false positives so you are only working on actual vulnerabilities. Our Advanced scanning service is £18 per asset scanned. To completement these two services, and to fill the gap between vulnerability scanning and full penetration testing, we offer a Lightweight Pentest at £345 per asset scanned. More Information Join over 2,000+ happy customers CYBER ESSENTIALS Cyber Essentials is the Government-backed, industry supported foundation for basic cyber security hygiene. The Scheme has been carefully designed to guide organisations of any size in protecting themselves against cyber threats. The foundation level is an independently verified self-assessment. You complete an online assessment questionnaire which is approved by a Senior Executive of your business. Upon submission, we will independently review and confirm your responses. If successful, we will award you the requisite certificate and badge that you can display on your company website. The next stage of your security journey and involves both independent internal and external tests of your network and computers. You must have been awarded the foundation level certification in the last three months before you can proceed with accreditation. Successful accreditation provides a higher level of assurance. It demonstrates that your organisation has a robust cyber security regime. It shows that controls are present to maintain a vigorous defence against Internet-based attacks. HOW CYBER ESSENTIALS HELPS YOUR BUSINESS RAPID TURN-AROUND REAL SUPPORT FROM A CISO COST EFFECTIVE, SIMPLE AND HASSLE-FREE MORE THAN 2000 SUCCESSFUL AUDITS PROVE WE KNOW WHAT WE ARE DOING CYBER ESSENTIALS COSTS The cost of Cyber Essentials can vary quite a lot between assessment companies. We have always endeavoured to keep our costs very transparent. Below you can see the costs and if you wish, you can purchase directly on our site by clicking on your required option. Cyber Essentials Assessment only: £250.00 plus VAT Cyber Essentials Plus for up to 50 devices, all being the same build: £1,500.00 plus VAT We also offer Cyber Essentials Plus for larger networks. You can select the size of your network from the dropdown option on the CE Plus page above. For companies with more complex needs, please simple download, complete and return this Cyber Essentials Scoping sheet and we will send you a bespoke price. Purchase CE Purchase CE+ Join over 2,000+ happy customers IT HEALTH CHECKS The PSN (Public Services Network) is the UK government’s network that connects all public services together. The network, which helps public sector organisations work together, reduces duplication and enables sharing of resources. We offer complete penetration testing and IT Health Check services to assist with your PSN CoCo (Code of Connection) submission. We regularly work with councils to perform ITHC’s for PSN compliance. We are contracted by several local and regional councils and departments to provide single and multi-year compliance audit programs. HOW IT HEALTH CHECKS HELPS YOUR BUSINESS APPROVED FOR LOCAL GOVERNMENT THROUGH THE CREST SCHEME 10 YEARS OF EXPERIENCE PERFORMING PSN IT HEALTH CHECKS WHAT IS IN THE PSN IT HEALTH CHECK An IT Health Check required both an Internal and an External assessment by a qualified assessor / auditor. Depending on the size of the network and number of devices, sample testing of a minimum of 10 per cent of the estate can be performed and correct scoping is critical to ensure that the service offered meets the CoCo requirements without being overbearing and over budget. EXTERNAL TESTING The External Assessment part of the ITHC should include public-facing services such as email servers, web servers and other systems such as the firewalls in place to prevent unauthorised access from the public Internet into your organisation. Any other inbound connections from the Internet such as Remote Access or Site-to-Site Virtual Private Networks (VPNs) also need to be penetration tested as part of the engagement. This assessment takes place for the infrastructure and authentication methods in place to protect the connections. INTERNAL TESTING Internal testing takes the form of a Penetration Test and should include Vulnerability Scanning and a thorough Manual Analysis of your internal network. At a minimum it should include: Desktop and Server build and configuration, and network management security Patching of Operating Systems, Applications and Firmware levels Configuration of Remote Access solutions including Virtual Private Networks (VPNs) and the associated authentication Build and Configuration Review of Laptops and other Mobile devices such as phones and tablets used for remote access Internal Security Gateway configuration including the Firewall connection to the PSN network. Wireless Network configuration The assessment of the above look to provide assurance that your internal systems are configured in a secure manner and are being properly maintained. Purchase online WHY CHOOSE HEDGEHOG CYBER SECURITY? Cyber Security for any size of business CREST member company Team of friendly certified experts LATEST FROM OUR BLOG See All Articles ➔ * Cyber Essentials, Data Protection, Guides 12 WAYS TO PROTECT YOUR AFFILIATE BUSINESS FROM CYBER ATTACK Securing your affiliate business is essential for looking after your clients, keeping out attackers and protecting your data. You can take several steps to protect your business, your clients, and your data from cybercriminals. Read full article * Cyber Essentials, Guides 10 WAYS TO PROTECT YOUR HOME/OFFICE NETWORK Our homes are more technologically advanced than ever. The family home now contains a wide range of gadgets and devices that require an internet connection. What was once just a computer now includes a tablet, phone, fridge, TV and baby monitor. Read full article * Cyber Essentials, Guides 5 WAYS TO SPOT A PHISHING EMAIL Phishing emails are the most common online threat. It is essential to know how to spot a phishing email and what to do with them. Here are five ways to spot, and defender yourself against, phishing attacks. Read full article * Cyber Essentials, Guides, News 5 WAYS TO IMPROVE CYBER SECURITY Five simple things to do today that will improve your cyber security and make you more resilient to a criminals digital attack. Read full article Hedgehog Security is a family owned and run, CREST regulated, Penetration Testing and Cyber Security Consultancy company. We believe every business has the right to a safer connected world. Our mission is to deliver that. Cyber Essentials Cyber Security Consulting Penetration Testing Vulnerability Scanning Our Security Statement Free Cyber Security Program Responsible Disclosure Privacy Policy Cookie Policy Terms & Conditions © Hedgehog Security 2009 - 2021 Site by Shopify Plus Agency - Digital Cake