hedgehogsecurity.co.uk Open in urlscan Pro
23.227.38.65  Public Scan

URL: https://hedgehogsecurity.co.uk/
Submission: On September 09 via automatic, source certstream-suspicious — Scanned from DE

Form analysis 4 forms found in the DOM

POST /cart

<form id="cart-drawer-items" action="/cart" method="post"></form>

POST /cart

<form id="cart-drawer-summary" action="/cart" method="post" class="cart-summary-mobile"></form>

GET /search

<form role="search" method="GET" class="search-form" action="/search">
  <div class="search-form__wrap">
    <div class="container">
      <p>What are you looking for?</p>
      <button type="button" class="search-form__close" id="CloseSearchOverlay" aria-label="Close Search Form"><svg xmlns="http://www.w3.org/2000/svg" width="19" height="19" viewBox="0 0 19 19">
          <path d="M19.7.7L19 0 9.9 9.1.7 0 0 .7l9.1 9.2L0 19l.7.7 9.2-9.1 9.1 9.1.7-.7-9.1-9.1z" fill="currentColor"></path>
        </svg></button>
      <div class="search-form__fields">
        <input type="hidden" name="type" value="product">
        <input class="search-form__input-text" placeholder="Search Products" aria-label="Search" autocomplete="off" type="text" name="q" onkeyup="this.setAttribute('value', this.value);" value="">
        <button class="search-form__submit" type="submit" aria-label="Search"><svg xmlns="http://www.w3.org/2000/svg" width="16.26" height="16.259" viewBox="0 0 16.26 16.259">
            <g transform="translate(0.75 4.301)">
              <g transform="translate(0 -3.551)">
                <path d="M69.911,64a5.911,5.911,0,1,0,5.911,5.911A5.911,5.911,0,0,0,69.911,64Z" transform="translate(-64 -64)" fill="none" stroke="currentColor" stroke-miterlimit="10" stroke-width="1.5"></path>
                <line x2="4.128" y2="4.128" transform="translate(10.321 10.32)" fill="none" stroke="currentColor" stroke-linecap="round" stroke-miterlimit="10" stroke-width="1.5"></line>
              </g>
            </g>
          </svg></button>
        <button class="search-form__clear" type="reset" aria-label="Close Search" value="Reset" onclick="this.parentNode.children[1].setAttribute('value', ''); document.querySelector('.search-form__suggestions').innerHTML = '';"><span
            class="cross-icon"></span></button>
      </div>
      <ul class="search-form__suggestions"></ul>
      <div class="no-results">
        <div class="no-results__message"></div>
        <h3>How can we help?</h3>
        <p>Looking for <strong>Penetration Testing</strong>?</p>
        <p>Want to explore our <strong>Security packages</strong>?</p>
        <p>Need Help? Call our friendly team for advice today on 0333 344 4256</p>
      </div>
    </div>
  </div>
</form>

GET /search

<form role="search" method="GET" action="/search">
  <input type="hidden" name="type" value="product">
  <input class="search_box" placeholder="Search by keyword" aria-label="Search" autocomplete="off" type="text" name="q" onkeyup="this.setAttribute('value', this.value);" value="">
  <input class="submit btn btn--small" type="submit" value="Search" aria-label="Search">
</form>

Text Content

This website stores cookies on your computer. These cookies are used to improve
your website experience and provide more personalized services to you, both on
this website and through other media. To find out more about the cookies we use,
see our Privacy Policy.

We won't track your information when you visit our site. But in order to comply
with your preferences, we'll have to use just one tiny cookie so that you're not
asked to make this choice again.

Accept Decline

Your Basket



Cyber security for any size of business

CREST member company

Team of friendly certified experts
 * Services
   * Penetration Testing
     * CREST Penetration Testing
     * GDPR and Data Protection
     * Legal Sector
     * Gaming Sector
     * What to Expect in a Pentest
     * Small Business Packages
   * Cyber Security Consulting
     * Buy 1 Hour Live Consulting
     * vCISO / Virtual CISO
   * Cyber Essentials
   * Vulnerability Scanning
 * Our Blog
 * Resources
   * Articles and Guides
   * Data Breach Search
   * Free Cyber Security Program
   * Free Website Security Assessment
 * About
   * Our Team
   * Contact Us
   * Cyber Security Internship

0333 344 4256


What are you looking for?




HOW CAN WE HELP?

Looking for Penetration Testing?

Want to explore our Security packages?

Need Help? Call our friendly team for advice today on 0333 344 4256


Services
Penetration Testing
CREST Penetration Testing
GDPR and Data Protection
Legal Sector
Gaming Sector
What to Expect in a Pentest
Small Business Packages
Cyber Security Consulting
Buy 1 Hour Live Consulting
vCISO / Virtual CISO
Cyber Essentials
Vulnerability Scanning
Our Blog
Resources
Articles and Guides
Data Breach Search
Free Cyber Security Program
Free Website Security Assessment
About
Our Team
Contact Us
Cyber Security Internship



GET CYBER SECURE BEFORE CHRISTMAS

Pentesting | Vulnerability Scanning | Cyber Essentials




CHRISTMAS IS COMING SOON. ARE YOU CYBER SECURE AND READY FOR THE FESTIVE PERIOD?
THE CRIMINALS ALREADY HAVE!




WHAT WE DO

Penetration TestingVulnerability ScanningCyber EssentialsIT Health Checks

Join over 2,000+ happy customers


PENETRATION TESTING

Penetration Testing or Pen Testing is a technical review of your systems, your
processes and sometimes your people. Penetration Testing is carried out to
uncover vulnerabilities, threats and risks that an attacker could exploit in
software applications, networks or web applications.

Penetration Testing can be called many things. We commonly see pentest,
pentesting and PENtest. They are all the same thing.

We perform a number of different types and classes of penetration testing to
help enable you to get the maximum return on your testing investment.



You reduce your Cyber Risk with penetration testing, as well as protect your
customers and your own information as well help maintain your reputation.


HOW PENETRATION TESTING HELPS YOUR BUSINESS

KNOW WHETHER YOUR CRITICAL ASSETS ARE AT RISK

IDENTIFY AND MITIGATE COMPLEX SECURITY VULNERABILITIES BEFORE AN ATTACK CAN
EXPLOIT THEM

GET REALISTIC FINDINGS AND COMPREHENSIVE RECOMMENDATIONS

UNDERSTAND HOW THE MOST SOPHISTICATED ATTACKERS OPERATE BASED ON INTELLIGENCE
GAINED OVER 10 YEARS OF BEING IN BUSINESS

 



PENETRATION TESTING DETAIL

Our penetration tests leverage deep knowledge of attacker’s behaviours and
methods. We use the same tools, tactics and procedures (TTPs). Every test is
custom built to every client’s needs and requirements. We assess specific
aspects of the security program and the state of security of systems, networks
and applications within the scope.

We set modern, realistic goals for our talented penetration testers to attempt
to achieve. These are the same goals that actual attackers would have in place
to justify their time and investment in their attacks.

We have some pre-built testing packages for web apps, mobile application,
external infrastructure, internal penetration testing, IoT device testing but if
you need something more bespoke and in-depth, Hedgehog can help.



 

More Information  Pentest Packages

Join over 2,000+ happy customers


VULNERABILITY SCANNING

The Hedgehog Vulnerability Scanning service is here to help you protect your
external infrastructure, keeping your business and your data safe. The
vulnerability scanning service is fast and easy to use. Using our external
vulnerability scanning service will enable you to:


HOW VULNERABILITY SCANNING HELPS YOUR BUSINESS

SCAN FOR THOUSANDS OF VULNERABILITIES IN YOUR FIREWALL AND EXTERNAL-FACING
SERVICES, HELPING YOU SEE EXACTLY WHAT CRIMINAL HACKERS CAN SEE;

IDENTIFY ALL THE WEAK SPOTS THAT NEED ATTENTION THROUGH DETAILED REPORTS;

ACT QUICKLY TO FIX YOUR SECURITY WEAKNESSES BEFORE CRIMINAL HACKERS FIND AND
EXPLOIT THEM;

PROTECT CUSTOMER DATA AND YOUR BRAND REPUTATION.

 



HOW WE RUN VULNERABILITY SCANS

Our scanning service is very simple to use. You simply log into our scanning
platform (access will be provided following your purchase) and enter your IP
addresses or URLs. If you would like to use the scheduler, you can choose the
time and date you want your scans to run. Once the scans are completed you can
view your reports online.

If you need to rerun your scans, you can do this direct from the scanner
interface whenever you need to.

 



3 TYPES OF SCANNING

We have three different levels or types of vulnerability scanning available. The
standard vulnerability scan is our foundation service at £8 per asset scanned.
Our Advanced service removes 99% of all false positives so you are only working
on actual vulnerabilities. Our Advanced scanning service is £18 per asset
scanned.

To completement these two services, and to fill the gap between vulnerability
scanning and full penetration testing, we offer a Lightweight Pentest at £345
per asset scanned.


 

More Information

Join over 2,000+ happy customers


CYBER ESSENTIALS

Cyber Essentials is the Government-backed, industry supported foundation for
basic cyber security hygiene. The Scheme has been carefully designed to guide
organisations of any size in protecting themselves against cyber threats.



The foundation level is an independently verified self-assessment. You complete
an online assessment questionnaire which is approved by a Senior Executive of
your business. Upon submission, we will independently review and confirm your
responses. If successful, we will award you the requisite certificate and badge
that you can display on your company website.


The next stage of your security journey and involves both independent internal
and external tests of your network and computers. You must have been awarded the
foundation level certification in the last three months before you can proceed
with accreditation. Successful accreditation provides a higher level of
assurance. It demonstrates that your organisation has a robust cyber security
regime. It shows that controls are present to maintain a vigorous defence
against Internet-based attacks.


HOW CYBER ESSENTIALS HELPS YOUR BUSINESS

RAPID TURN-AROUND

REAL SUPPORT FROM A CISO

COST EFFECTIVE, SIMPLE AND HASSLE-FREE

MORE THAN 2000 SUCCESSFUL AUDITS PROVE WE KNOW WHAT WE ARE DOING

 



CYBER ESSENTIALS COSTS

The cost of Cyber Essentials can vary quite a lot between assessment companies.
We have always endeavoured to keep our costs very transparent. Below you can see
the costs and if you wish, you can purchase directly on our site by clicking on
your required option.

Cyber Essentials Assessment only: £250.00 plus VAT

Cyber Essentials Plus for up to 50 devices, all being the same build: £1,500.00
plus VAT


We also offer Cyber Essentials Plus for larger networks. You can select the size
of your network from the dropdown option on the CE Plus page above.

For companies with more complex needs, please simple download, complete and
return this Cyber Essentials Scoping sheet and we will send you a bespoke price.




 

Purchase CE  Purchase CE+

Join over 2,000+ happy customers


IT HEALTH CHECKS

The PSN (Public Services Network) is the UK government’s network that connects
all public services together. The network, which helps public sector
organisations work together, reduces duplication and enables sharing of
resources.

We offer complete penetration testing and IT Health Check services to assist
with your PSN CoCo (Code of Connection) submission. We regularly work with
councils to perform ITHC’s for PSN compliance. We are contracted by several
local and regional councils and departments to provide single and multi-year
compliance audit programs.


HOW IT HEALTH CHECKS HELPS YOUR BUSINESS

APPROVED FOR LOCAL GOVERNMENT THROUGH THE CREST SCHEME

10 YEARS OF EXPERIENCE PERFORMING PSN IT HEALTH CHECKS

 



WHAT IS IN THE PSN IT HEALTH CHECK

An IT Health Check required both an Internal and an External assessment by a
qualified assessor / auditor.

Depending on the size of the network and number of devices, sample testing of a
minimum of 10 per cent of the estate can be performed and correct scoping is
critical to ensure that the service offered meets the CoCo requirements without
being overbearing and over budget.

 



EXTERNAL TESTING

The External Assessment part of the ITHC should include public-facing services
such as email servers, web servers and other systems such as the firewalls in
place to prevent unauthorised access from the public Internet into your
organisation.

Any other inbound connections from the Internet such as Remote
Access or Site-to-Site Virtual Private Networks (VPNs) also need to be
penetration tested as part of the engagement. This assessment takes place for
the infrastructure and authentication methods in place to protect the
connections.

 



INTERNAL TESTING

Internal testing takes the form of a Penetration Test and should
include Vulnerability Scanning and a thorough Manual Analysis of your internal
network.

At a minimum it should include:

Desktop and Server build and configuration, and network management security
Patching of Operating Systems, Applications and Firmware levels
Configuration of Remote Access solutions including Virtual Private Networks
(VPNs) and the associated authentication
Build and Configuration Review of Laptops and other Mobile devices such as
phones and tablets used for remote access
Internal Security Gateway configuration including the Firewall connection to the
PSN network.
Wireless Network configuration

The assessment of the above look to provide assurance that your internal systems
are configured in a secure manner and are being properly maintained.

 

Purchase online


WHY CHOOSE HEDGEHOG CYBER SECURITY?

Cyber Security for any size of business

CREST member company

Team of friendly certified experts


LATEST FROM OUR BLOG

See All Articles ➔
 * Cyber Essentials, Data Protection, Guides


12 WAYS TO PROTECT YOUR AFFILIATE BUSINESS FROM CYBER ATTACK

Securing your affiliate business is essential for looking after your clients,
keeping out attackers and protecting your data. You can take several steps to
protect your business, your clients, and your data from cybercriminals. Read
full article
 * Cyber Essentials, Guides


10 WAYS TO PROTECT YOUR HOME/OFFICE NETWORK

Our homes are more technologically advanced than ever. The family home now
contains a wide range of gadgets and devices that require an internet
connection. What was once just a computer now includes a tablet, phone, fridge,
TV and baby monitor. Read full article
 * Cyber Essentials, Guides


5 WAYS TO SPOT A PHISHING EMAIL

Phishing emails are the most common online threat. It is essential to know how
to spot a phishing email and what to do with them. Here are five ways to spot,
and defender yourself against, phishing attacks. Read full article
 * Cyber Essentials, Guides, News


5 WAYS TO IMPROVE CYBER SECURITY

Five simple things to do today that will improve your cyber security and make
you more resilient to a criminals digital attack. Read full article

Hedgehog Security is a family owned and run, CREST regulated, Penetration
Testing and Cyber Security Consultancy company. We believe every business has
the right to a safer connected world. Our mission is to deliver that.


Cyber Essentials

Cyber Security Consulting

Penetration Testing

Vulnerability Scanning


Our Security Statement

Free Cyber Security Program

Responsible Disclosure

Privacy Policy

Cookie Policy

Terms & Conditions



© Hedgehog Security 2009 - 2021
Site by Shopify Plus Agency - Digital Cake