www.canarytrap.com
Open in
urlscan Pro
35.203.37.123
Public Scan
Submitted URL: http://canarytrap.com/
Effective URL: https://www.canarytrap.com/
Submission: On July 07 via manual from CA — Scanned from CA
Effective URL: https://www.canarytrap.com/
Submission: On July 07 via manual from CA — Scanned from CA
Form analysis
1 forms found in the DOMPOST /
<form method="post" enctype="multipart/form-data" target="gform_ajax_frame_2" id="gform_2" action="/" data-formid="2">
<div class="gform-body gform_body">
<ul id="gform_fields_2" class="gform_fields top_label form_sublabel_below description_below">
<li id="field_2_7" class="gfield gfield--type-text gfield_contains_required field_sublabel_below gfield--no-description field_description_below hidden_label gfield_visibility_visible" data-js-reload="field_2_7"><label
class="gfield_label gform-field-label" for="input_2_7">Full Name<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
<div class="ginput_container ginput_container_text"><input name="input_7" id="input_2_7" type="text" value="" class="large" placeholder="Full Name" aria-required="true" aria-invalid="false"> </div>
</li>
<li id="field_2_4" class="gfield gfield--type-email gfield_contains_required field_sublabel_below gfield--no-description field_description_above hidden_label gfield_visibility_visible" data-js-reload="field_2_4"><label
class="gfield_label gform-field-label" for="input_2_4">Email Address<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
<div class="ginput_container ginput_container_email">
<input name="input_4" id="input_2_4" type="text" value="" class="medium" placeholder="Email Address" aria-required="true" aria-invalid="false">
</div>
</li>
<li id="field_2_5" class="gfield gfield--type-phone gfield_contains_required field_sublabel_below gfield--no-description field_description_below hidden_label gfield_visibility_visible" data-js-reload="field_2_5"><label
class="gfield_label gform-field-label" for="input_2_5">Phone<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
<div class="ginput_container ginput_container_phone"><input name="input_5" id="input_2_5" type="text" value="" class="large" placeholder="Phone" aria-required="true" aria-invalid="false"></div>
</li>
<li id="field_2_6" class="gfield gfield--type-textarea gfield_contains_required field_sublabel_below gfield--no-description field_description_below hidden_label gfield_visibility_visible" data-js-reload="field_2_6"><label
class="gfield_label gform-field-label" for="input_2_6">Untitled<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
<div class="ginput_container ginput_container_textarea"><textarea name="input_6" id="input_2_6" class="textarea small" placeholder="Enter a brief description of your inquiry." aria-required="true" aria-invalid="false" rows="10"
cols="50"></textarea></div>
</li>
<li id="field_2_8" class="gfield gfield--type-captcha field_sublabel_below gfield--no-description field_description_below hidden_label gfield_visibility_visible" data-js-reload="field_2_8"><label class="gfield_label gform-field-label"
for="input_2_8">CAPTCHA</label>
<div id="input_2_8" class="ginput_container ginput_recaptcha gform-initialized" data-sitekey="6Le6HK8ZAAAAALluNNUqvnvBM0N2wj3u9imZ6sgX" data-theme="light" data-tabindex="-1" data-size="invisible" data-badge="bottomright">
<div class="grecaptcha-badge" data-style="bottomright"
style="width: 256px; height: 60px; position: fixed; visibility: hidden; display: block; transition: right 0.3s ease 0s; bottom: 14px; right: -186px; box-shadow: gray 0px 0px 5px; border-radius: 2px; overflow: hidden;">
<div class="grecaptcha-logo"><iframe title="reCAPTCHA"
src="https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Le6HK8ZAAAAALluNNUqvnvBM0N2wj3u9imZ6sgX&co=aHR0cHM6Ly93d3cuY2FuYXJ5dHJhcC5jb206NDQz&hl=en&v=khH7Ei3klcvfRI74FvDcfuOo&theme=light&size=invisible&badge=bottomright&cb=xeoweny2blvz"
width="256" height="60" role="presentation" name="a-kxe0a814wiw1" frameborder="0" scrolling="no" sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"
tabindex="-1"></iframe></div>
<div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
</div><iframe style="display: none;"></iframe>
</div>
</li>
<li id="field_2_9" class="gfield gfield--type-honeypot gform_validation_container field_sublabel_below gfield--has-description field_description_below gfield_visibility_visible" data-js-reload="field_2_9"><label
class="gfield_label gform-field-label" for="input_2_9">Email</label>
<div class="ginput_container"><input name="input_9" id="input_2_9" type="text" value=""></div>
<div class="gfield_description" id="gfield_description_2_9">This field is for validation purposes and should be left unchanged.</div>
</li>
</ul>
</div>
<div class="gform_footer top_label"> <input type="submit" id="gform_submit_button_2" class="gform_button button" value="Send" onclick="if(window["gf_submitting_2"]){return false;} window["gf_submitting_2"]=true; "
onkeypress="if( event.keyCode == 13 ){ if(window["gf_submitting_2"]){return false;} window["gf_submitting_2"]=true; jQuery("#gform_2").trigger("submit",[true]); }"> <input type="hidden" name="gform_ajax"
value="form_id=2&title=1&description=1&tabindex=0">
<input type="hidden" class="gform_hidden" name="is_submit_2" value="1">
<input type="hidden" class="gform_hidden" name="gform_submit" value="2">
<input type="hidden" class="gform_hidden" name="gform_unique_id" value="">
<input type="hidden" class="gform_hidden" name="state_2" value="WyJbXSIsIjkzYWI5NjVkYmQzODY0NDRhZmM0Y2VjYjM3ZTk3MzljIl0=">
<input type="hidden" class="gform_hidden" name="gform_target_page_number_2" id="gform_target_page_number_2" value="0">
<input type="hidden" class="gform_hidden" name="gform_source_page_number_2" id="gform_source_page_number_2" value="1">
<input type="hidden" name="gform_field_values" value="">
</div>
</form>
Text Content
* Home * Corporate * * * About Us * Corporate Values * Social Responsibility * What is a Canary Trap? * Careers * * Canary Trap – a recognized leader in offensive security testing. Canary Trap has been identified as a “Top 10” Emerging Penetration Testing Solutions Provider by GRC Outlook for 2023. Click here to view the article. * Services * * * External Vulnerability Assessment & Penetration Testing * Internal Network Penetration Testing * Wireless Security Testing * Web & Mobile Application Penetration Testing * Instructor-Led Security Awareness Training * Threat Risk Assessment * * Secure Code Review * Compromise Assessment – Active Threat * Compromise Assessment – Security Controls * Digital Forensics & e-Discovery * Cybersecurity Incident Management Planning * * * Require proof of remediation? As part of our security testing services, upon validating that the identified vulnerabilities have been successfully remediated, Canary Trap will issue a verifiable Security Certificate. * Resources * Scoping Questionnaire * Blog * Industry News * Studies & Reports * Certificate * Contact * Submit an Inquiry * Locations * Home * Corporate * * * About Us * Corporate Values * Social Responsibility * What is a Canary Trap? * Careers * * Canary Trap – a recognized leader in offensive security testing. Canary Trap has been identified as a “Top 10” Emerging Penetration Testing Solutions Provider by GRC Outlook for 2023. Click here to view the article. * Services * * * External Vulnerability Assessment & Penetration Testing * Internal Network Penetration Testing * Wireless Security Testing * Web & Mobile Application Penetration Testing * Instructor-Led Security Awareness Training * Threat Risk Assessment * * Secure Code Review * Compromise Assessment – Active Threat * Compromise Assessment – Security Controls * Digital Forensics & e-Discovery * Cybersecurity Incident Management Planning * * * Require proof of remediation? As part of our security testing services, upon validating that the identified vulnerabilities have been successfully remediated, Canary Trap will issue a verifiable Security Certificate. * Resources * Scoping Questionnaire * Blog * Industry News * Studies & Reports * Certificate * Contact * Submit an Inquiry * Locations © Canary Trap 2023 All Rights Reserved Share CANARY TRAP TAKING A PRAGMATIC, RISK-BASED APPROACH TO ASSESSING SECURITY HYGIENE AND RESILIENCY. Canary Trap understands that cybersecurity is no longer an IT problem; it’s a BUSINESS problem! Our reports are written for an executive audience and focus on risk and impact; not 1s and 0s or bits and bytes. SERVICING SMALL BUSINESS TO GLOBAL ENTERPRISE. Canary Trap is engaged by organizations of all shapes, sizes and industry types. OFFERING UNPARALLELED SECURITY EXPERTISE. Canary Trap aims to be your partner in helping to solve the enterprise security challenge effectively and efficiently. CATCHING VULNERABILITIES AND TRAPPING EXPLOITS. Canary Trap is a recognized leader in offensive security testing. We have the expertise, experience and credentials to help ensure that your networks, data, employees web and mobile applications are secure. DRIVING SECURITY AWARENESS WITH THE BOARD & EXECUTIVE LEADERSHIP TEAM. You’re only as strong as your weakest link. Canary Trap has developed a high-impact, instructor-led Security Awareness Training program for Directors & Officers (and Employees). ENSURING CLIENT SATISFACTION THROUGH QUALITY ASSURANCE. Canary Trap’s job isn’t done until you’re completely satisfied. Our quality assurance process ensures ALL findings are validated through peer review. Every report generated is checked for formatting, grammar and subject matter before being published. TAKING A PRAGMATIC, RISK-BASED APPROACH TO ASSESSING SECURITY HYGIENE AND RESILIENCY. Canary Trap understands that cybersecurity is no longer an IT problem; it’s a BUSINESS problem! Our reports are written for an executive audience and focus on risk and impact; not 1s and 0s or bits and bytes. SERVICING SMALL BUSINESS TO GLOBAL ENTERPRISE. Canary Trap is engaged by organizations of all shapes, sizes and industry types. OFFERING UNPARALLELED SECURITY EXPERTISE. Canary Trap aims to be your partner in helping to solve the enterprise security challenge effectively and efficiently. CATCHING VULNERABILITIES AND TRAPPING EXPLOITS. Canary Trap is a recognized leader in offensive security testing. We have the expertise, experience and credentials to help ensure that your networks, data, employees web and mobile applications are secure. DRIVING SECURITY AWARENESS WITH THE BOARD & EXECUTIVE LEADERSHIP TEAM. You’re only as strong as your weakest link. Canary Trap has developed a high-impact, instructor-led Security Awareness Training program for Directors & Officers (and Employees). ENSURING CLIENT SATISFACTION THROUGH QUALITY ASSURANCE. Canary Trap’s job isn’t done until you’re completely satisfied. Our quality assurance process ensures ALL findings are validated through peer review. Every report generated is checked for formatting, grammar and subject matter before being published. ‹› Services EXPERTS IN CYBERSECURITY. Canary Trap’s elite team of security experts come armed with the necessary experience, credentials and tools to help improve your organization’s security resiliency and cyber risk posture. We offer a robust, albeit highly focused Services Catalogue: EXTERNAL VULNERABILITY ASSESSMENT & PENETRATION TESTING Identify how cyber criminals can disrupt IT systems, steal data and harm brand reputation from outside of your network. INTERNAL NETWORK PENETRATION TESTING Identify security vulnerabilities that exist within the corporate network. Most cyber insurers require annual internal testing. WIRELESS SECURITY ASSESSMENT Tests the security of your wireless network(s) by attempting to gain unauthorized access -or- manipulating employee network traffic. WEB & MOBILE APPLICATION TESTING Identify, enumerate and resolve any security vulnerabilities within your mission and business-critical applications. INSTRUCTOR-LED SECURITY AWARENESS TRAINING You’re only as strong as your weakest link. Take a hands-on approach to educating your Board and Executive Leadership Team on the latest cyber threats. THREAT RISK ASSESSMENT Generally driven by compliance, a Threat Risk Assessment is performed to assess and report on security risks to target information systems. SECURE CODE REVIEW Analyzes source code to identify and report on errors, defects, bugs and security vulnerabilities. COMPROMISE ASSESSMENT – ACTIVE THREAT Identify if your corporate IT infrastructure has been compromised through the network, servers and computers for malicious activities. COMPROMISE ASSESSMENT – SECURITY CONTROLS Assess how difficult it is for a sophisticated threat actor to bypass your existing security controls. DIGITAL FORENSICS & e-DISCOVERY The process of identification, preservation, extraction, and documentation of digital evidence which can be used in a court of law. CYBERSECURITY INCIDENT MANAGEMENT PLANNING Develop tailored policies to ensure that security incidents can be managed effectively and efficiently in order to mitigate risk and impact. READY TO START A SERVICE? Visit our scoping questionnaire page and fill out your form today! Scoping Questionnaire SECURITY AWARENESS Cybersecurity is an investment, not a cost center. It’s important for IT leaders to make security business contextual when building the business case for new investments. The following statistics are cited from Verizon’s 2023 Data Breach Investigations Report: 0 OF BREACHES INVOLVED EXTERNAL ACTORS—WITH THE MAJORITY BEING FINANCIALLY MOTIVATED. 0 OF BREACHES INVOLVED THE HUMAN ELEMENT, WHICH INCLUDES SOCIAL ENGINEERING ATTACKS, ERRORS OR MISUSE. 0 OF ALL SOCIAL ENGINEERING ATTACKS ARE PRETEXTING INCIDENTS—NEARLY DOUBLE LAST YEAR’S TOTAL. Process CANARY TRAP’S 5-STEP APPROACH FOR EFFECTIVE SECURITY TESTING AND ASSESSMENTS Define / Uncover / Report / Remediate / Retest Canary Trap combines human expertise with sophisticated tools and, where appropriate, threat intelligence to ensure a thorough, in-depth approach to security testing and assessments. Our 5-step approach has been developed leveraging years of experience working on countless engagements with customers of every size, shape and industry type. To learn more about Canary Trap’s 5-step approach for effective security testing and assessments please watch the video. GIVING YOU ALL THE REASONS TO DO BUSINESS WITH CANARY TRAP * ELITE TEAM Canary Trap was founded by ethical hackers and security experts who share in the common goal of reducing the potential risk and associated impact of a security breach. * EXPERIENCED AND CERTIFIED Canary Trap’s elite team of security experts have years of experience and maintain all necessary certifications to deliver high quality engagements across our Service Catalogue. * CUSTOMER FOCUS You say “jump” and we say, “how high?” Our client-first, can-do attitude enables us to offer customers the ultimate flexibility to achieve underlying goals and meet specific requirements. * BESPOKE VS. ONE SIZE FITS ALL Every project is unique. We will deliver a Statement of Work specific to your engagement that clearly articulates the Project Scope, Methodology, Key Deliverables and Costs associated. * DIVERSITY OF APPROACH Canary Trap’s elite team of security experts come from diverse backgrounds. We will assign the right resource(s) to ensure a thorough and detailed approach to your specific project. * PRAGMATIC REPORTING Canary Trap takes a sensible and realistic approach when assessing the risk(s) and impact(s) to our clients. Every report is handcrafted and incorporates practical knowledge to remediate. News INDUSTRY NEWS * All * Industry News * News * Uncategorized All Industry News News Uncategorized ETHICAL & LEGAL CONSIDERATIONS Penetration testing, or ethical hacking, has become a key process for organizations to identify and correct vulnerabilities in their systems before they can be exploited by cybercriminals. However, there are ethical and legal considerations that organizations must take into account in order to successfully conduct penetration testing in a responsible manner. Gillam, Jason. 2023. “What […] Read more RISK-BASED PATCH MANAGEMENT Risk-Based Patch Management assists IT teams in optimizing their time by identifying the priority of threats. By prioritizing the mitigation of critical threats, it enables the team to concentrate their efforts on addressing the most urgent vulnerabilities. This approach allows the team to make significant progress in establishing an effective patch management strategy while ensuring […] Read more BBC, BA SUFFER DATA BREACHES IN WAKE OF MOVEIT ATTACKS The BBC, British Airways and Boots have all confirmed data breaches as a result of an attack on Zellis, a British enterprise payroll provider. Zellis has fallen victim to exploitation of a zero day (previously unknown) vulnerability in enterprise file transfer software “MOVEit Transfer.” Read more TOYOTA DISCLOSES NEW DATA BREACH INVOLVING VEHICLE, CUSTOMER INFORMATION Japanese car maker Toyota this week announced that cloud configuration issues have led to years-long exposure of customer data. The impacted environments, which are managed by Toyota Connected Corporation (TC), contain information related to the vehicles of Japanese customers, as well as the personal information of customers overseas. Read more Canary Trap is a focused cybersecurity services provider offering robust security services to private and public-sector organizations. Our goal is to improve the security hygiene and resiliency of our client organizations. CONTACT * P: (844) 750-2018 * E: inquiries@canarytrap.com MISSISSAUGA (CAN HQ) * 2425 Matheson Boulevard East * 8th Floor * Mississauga, Ontario * L4W 5K4 * BUFFALO (USA HQ) * 50 Fountain Plaza * Suite 1400 * Buffalo, New York * 14202 * WINNIPEG * 201 Portage Avenue * 18th Floor * Winnipeg, Manitoba * R3B 3K6 * TAMPA * 4830 West Kennedy Boulevard * Suite 600 * Tampa, Florida * 33609 * © 2023 Canary Trap. All rights reserved | Privacy Policy To Top * * Experiencing a Security Breach? Call (844) 750-2018 Contact us CANARY TRAP × Take the next step to engage with Canary Trap If you require our cybersecurity services please share your details below and we will be in touch! POPUP FORM * Full Name* * Email Address* * Phone* * Untitled* * CAPTCHA * Email This field is for validation purposes and should be left unchanged. (844) 750-2018 OR inquiries@canarytrap.com Your inquiry has been submitted successfully Notifications