www.canarytrap.com Open in urlscan Pro
35.203.37.123  Public Scan

Submitted URL: http://canarytrap.com/
Effective URL: https://www.canarytrap.com/
Submission: On July 07 via manual from CA — Scanned from CA

Form analysis 1 forms found in the DOM

POST /

<form method="post" enctype="multipart/form-data" target="gform_ajax_frame_2" id="gform_2" action="/" data-formid="2">
  <div class="gform-body gform_body">
    <ul id="gform_fields_2" class="gform_fields top_label form_sublabel_below description_below">
      <li id="field_2_7" class="gfield gfield--type-text gfield_contains_required field_sublabel_below gfield--no-description field_description_below hidden_label gfield_visibility_visible" data-js-reload="field_2_7"><label
          class="gfield_label gform-field-label" for="input_2_7">Full Name<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
        <div class="ginput_container ginput_container_text"><input name="input_7" id="input_2_7" type="text" value="" class="large" placeholder="Full Name" aria-required="true" aria-invalid="false"> </div>
      </li>
      <li id="field_2_4" class="gfield gfield--type-email gfield_contains_required field_sublabel_below gfield--no-description field_description_above hidden_label gfield_visibility_visible" data-js-reload="field_2_4"><label
          class="gfield_label gform-field-label" for="input_2_4">Email Address<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
        <div class="ginput_container ginput_container_email">
          <input name="input_4" id="input_2_4" type="text" value="" class="medium" placeholder="Email Address" aria-required="true" aria-invalid="false">
        </div>
      </li>
      <li id="field_2_5" class="gfield gfield--type-phone gfield_contains_required field_sublabel_below gfield--no-description field_description_below hidden_label gfield_visibility_visible" data-js-reload="field_2_5"><label
          class="gfield_label gform-field-label" for="input_2_5">Phone<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
        <div class="ginput_container ginput_container_phone"><input name="input_5" id="input_2_5" type="text" value="" class="large" placeholder="Phone" aria-required="true" aria-invalid="false"></div>
      </li>
      <li id="field_2_6" class="gfield gfield--type-textarea gfield_contains_required field_sublabel_below gfield--no-description field_description_below hidden_label gfield_visibility_visible" data-js-reload="field_2_6"><label
          class="gfield_label gform-field-label" for="input_2_6">Untitled<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
        <div class="ginput_container ginput_container_textarea"><textarea name="input_6" id="input_2_6" class="textarea small" placeholder="Enter a brief description of your inquiry." aria-required="true" aria-invalid="false" rows="10"
            cols="50"></textarea></div>
      </li>
      <li id="field_2_8" class="gfield gfield--type-captcha field_sublabel_below gfield--no-description field_description_below hidden_label gfield_visibility_visible" data-js-reload="field_2_8"><label class="gfield_label gform-field-label"
          for="input_2_8">CAPTCHA</label>
        <div id="input_2_8" class="ginput_container ginput_recaptcha gform-initialized" data-sitekey="6Le6HK8ZAAAAALluNNUqvnvBM0N2wj3u9imZ6sgX" data-theme="light" data-tabindex="-1" data-size="invisible" data-badge="bottomright">
          <div class="grecaptcha-badge" data-style="bottomright"
            style="width: 256px; height: 60px; position: fixed; visibility: hidden; display: block; transition: right 0.3s ease 0s; bottom: 14px; right: -186px; box-shadow: gray 0px 0px 5px; border-radius: 2px; overflow: hidden;">
            <div class="grecaptcha-logo"><iframe title="reCAPTCHA"
                src="https://www.google.com/recaptcha/api2/anchor?ar=1&amp;k=6Le6HK8ZAAAAALluNNUqvnvBM0N2wj3u9imZ6sgX&amp;co=aHR0cHM6Ly93d3cuY2FuYXJ5dHJhcC5jb206NDQz&amp;hl=en&amp;v=khH7Ei3klcvfRI74FvDcfuOo&amp;theme=light&amp;size=invisible&amp;badge=bottomright&amp;cb=xeoweny2blvz"
                width="256" height="60" role="presentation" name="a-kxe0a814wiw1" frameborder="0" scrolling="no" sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"
                tabindex="-1"></iframe></div>
            <div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
              style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
          </div><iframe style="display: none;"></iframe>
        </div>
      </li>
      <li id="field_2_9" class="gfield gfield--type-honeypot gform_validation_container field_sublabel_below gfield--has-description field_description_below gfield_visibility_visible" data-js-reload="field_2_9"><label
          class="gfield_label gform-field-label" for="input_2_9">Email</label>
        <div class="ginput_container"><input name="input_9" id="input_2_9" type="text" value=""></div>
        <div class="gfield_description" id="gfield_description_2_9">This field is for validation purposes and should be left unchanged.</div>
      </li>
    </ul>
  </div>
  <div class="gform_footer top_label"> <input type="submit" id="gform_submit_button_2" class="gform_button button" value="Send" onclick="if(window[&quot;gf_submitting_2&quot;]){return false;}  window[&quot;gf_submitting_2&quot;]=true;  "
      onkeypress="if( event.keyCode == 13 ){ if(window[&quot;gf_submitting_2&quot;]){return false;} window[&quot;gf_submitting_2&quot;]=true;  jQuery(&quot;#gform_2&quot;).trigger(&quot;submit&quot;,[true]); }"> <input type="hidden" name="gform_ajax"
      value="form_id=2&amp;title=1&amp;description=1&amp;tabindex=0">
    <input type="hidden" class="gform_hidden" name="is_submit_2" value="1">
    <input type="hidden" class="gform_hidden" name="gform_submit" value="2">
    <input type="hidden" class="gform_hidden" name="gform_unique_id" value="">
    <input type="hidden" class="gform_hidden" name="state_2" value="WyJbXSIsIjkzYWI5NjVkYmQzODY0NDRhZmM0Y2VjYjM3ZTk3MzljIl0=">
    <input type="hidden" class="gform_hidden" name="gform_target_page_number_2" id="gform_target_page_number_2" value="0">
    <input type="hidden" class="gform_hidden" name="gform_source_page_number_2" id="gform_source_page_number_2" value="1">
    <input type="hidden" name="gform_field_values" value="">
  </div>
</form>

Text Content

 * Home
 * Corporate
   * * * About Us
       * Corporate Values
       * Social Responsibility
       * What is a Canary Trap?
       * Careers
     
     * * Canary Trap – a recognized leader in offensive security testing.
         Canary Trap has been identified as a “Top 10” Emerging Penetration
         Testing Solutions Provider by GRC Outlook for 2023. Click here to view
         the article.
 * Services
   * * * External Vulnerability Assessment & Penetration Testing
       * Internal Network Penetration Testing
       * Wireless Security Testing
       * Web & Mobile Application Penetration Testing
       * Instructor-Led Security Awareness Training
       * Threat Risk Assessment
     * * Secure Code Review
       * Compromise Assessment – Active Threat
       * Compromise Assessment – Security Controls
       * Digital Forensics & e-Discovery
       * Cybersecurity Incident Management Planning
     * * 
       
       * Require proof of remediation?
         
         As part of our security testing services, upon validating that the
         identified vulnerabilities have been successfully remediated, Canary
         Trap will issue a verifiable Security Certificate.
 * Resources
   * Scoping Questionnaire
   * Blog
   * Industry News
   * Studies & Reports
 * Certificate
 * Contact
   * Submit an Inquiry
   * Locations

 * Home
 * Corporate
   * * * About Us
       * Corporate Values
       * Social Responsibility
       * What is a Canary Trap?
       * Careers
     
     * * Canary Trap – a recognized leader in offensive security testing.
         Canary Trap has been identified as a “Top 10” Emerging Penetration
         Testing Solutions Provider by GRC Outlook for 2023. Click here to view
         the article.
 * Services
   * * * External Vulnerability Assessment & Penetration Testing
       * Internal Network Penetration Testing
       * Wireless Security Testing
       * Web & Mobile Application Penetration Testing
       * Instructor-Led Security Awareness Training
       * Threat Risk Assessment
     * * Secure Code Review
       * Compromise Assessment – Active Threat
       * Compromise Assessment – Security Controls
       * Digital Forensics & e-Discovery
       * Cybersecurity Incident Management Planning
     * * 
       
       * Require proof of remediation?
         
         As part of our security testing services, upon validating that the
         identified vulnerabilities have been successfully remediated, Canary
         Trap will issue a verifiable Security Certificate.
 * Resources
   * Scoping Questionnaire
   * Blog
   * Industry News
   * Studies & Reports
 * Certificate
 * Contact
   * Submit an Inquiry
   * Locations

© Canary Trap 2023 All Rights Reserved
Share





CANARY TRAP


TAKING A PRAGMATIC, RISK-BASED APPROACH TO ASSESSING SECURITY HYGIENE AND
RESILIENCY.

Canary Trap understands that cybersecurity is no longer an IT problem; it’s a
BUSINESS problem! Our reports are written for an executive audience and focus on
risk and impact; not 1s and 0s or bits and bytes.


SERVICING SMALL BUSINESS TO GLOBAL ENTERPRISE.

Canary Trap is engaged by organizations of all shapes, sizes and industry types.


OFFERING UNPARALLELED SECURITY EXPERTISE.

Canary Trap aims to be your partner in helping to solve the enterprise security
challenge effectively and efficiently.


CATCHING VULNERABILITIES AND TRAPPING EXPLOITS.

Canary Trap is a recognized leader in offensive security testing. We have the
expertise, experience and credentials to help ensure that your networks, data,
employees web and mobile applications are secure.


DRIVING SECURITY AWARENESS WITH THE BOARD & EXECUTIVE LEADERSHIP TEAM.

You’re only as strong as your weakest link. Canary Trap has developed a
high-impact, instructor-led Security Awareness Training program for Directors &
Officers (and Employees).


ENSURING CLIENT SATISFACTION THROUGH QUALITY ASSURANCE.

Canary Trap’s job isn’t done until you’re completely satisfied. Our quality
assurance process ensures ALL findings are validated through peer review. Every
report generated is checked for formatting, grammar and subject matter before
being published.


TAKING A PRAGMATIC, RISK-BASED APPROACH TO ASSESSING SECURITY HYGIENE AND
RESILIENCY.

Canary Trap understands that cybersecurity is no longer an IT problem; it’s a
BUSINESS problem! Our reports are written for an executive audience and focus on
risk and impact; not 1s and 0s or bits and bytes.


SERVICING SMALL BUSINESS TO GLOBAL ENTERPRISE.

Canary Trap is engaged by organizations of all shapes, sizes and industry types.


OFFERING UNPARALLELED SECURITY EXPERTISE.

Canary Trap aims to be your partner in helping to solve the enterprise security
challenge effectively and efficiently.


CATCHING VULNERABILITIES AND TRAPPING EXPLOITS.

Canary Trap is a recognized leader in offensive security testing. We have the
expertise, experience and credentials to help ensure that your networks, data,
employees web and mobile applications are secure.


DRIVING SECURITY AWARENESS WITH THE BOARD & EXECUTIVE LEADERSHIP TEAM.

You’re only as strong as your weakest link. Canary Trap has developed a
high-impact, instructor-led Security Awareness Training program for Directors &
Officers (and Employees).


ENSURING CLIENT SATISFACTION THROUGH QUALITY ASSURANCE.

Canary Trap’s job isn’t done until you’re completely satisfied. Our quality
assurance process ensures ALL findings are validated through peer review. Every
report generated is checked for formatting, grammar and subject matter before
being published.

‹›




Services


EXPERTS IN CYBERSECURITY.



Canary Trap’s elite team of security experts come armed with the necessary
experience, credentials and tools to help improve your organization’s security
resiliency and cyber risk posture. We offer a robust, albeit highly focused
Services Catalogue:



EXTERNAL VULNERABILITY ASSESSMENT & PENETRATION TESTING



Identify how cyber criminals can disrupt IT systems, steal data and harm brand
reputation from outside of your network.



INTERNAL NETWORK PENETRATION TESTING



Identify security vulnerabilities that exist within the corporate network. Most
cyber insurers require annual internal testing.



WIRELESS SECURITY ASSESSMENT



Tests the security of your wireless network(s) by attempting to gain
unauthorized access -or- manipulating employee network traffic.



WEB & MOBILE APPLICATION TESTING



Identify, enumerate and resolve any security vulnerabilities within your mission
and business-critical applications.




INSTRUCTOR-LED SECURITY AWARENESS TRAINING



You’re only as strong as your weakest link. Take a hands-on approach to
educating your Board and Executive Leadership Team on the latest cyber threats.



THREAT RISK ASSESSMENT



Generally driven by compliance, a Threat Risk Assessment is performed to assess
and report on security risks to target information systems.



SECURE CODE REVIEW



Analyzes source code to identify and report on errors, defects, bugs and
security vulnerabilities.



COMPROMISE ASSESSMENT – ACTIVE THREAT



Identify if your corporate IT infrastructure has been compromised through the
network, servers and computers for malicious activities.




COMPROMISE ASSESSMENT – SECURITY CONTROLS



Assess how difficult it is for a sophisticated threat actor to bypass your
existing security controls.



DIGITAL FORENSICS & e-DISCOVERY



The process of identification, preservation, extraction, and documentation of
digital evidence which can be used in a court of law.



CYBERSECURITY INCIDENT MANAGEMENT PLANNING



Develop tailored policies to ensure that security incidents can be managed
effectively and efficiently in order to mitigate risk and impact.



READY TO START A SERVICE?



Visit our scoping questionnaire page and fill out your form today!


Scoping Questionnaire


SECURITY
AWARENESS

Cybersecurity is an investment, not a cost center. It’s important for IT leaders
to make security business contextual when building the business case for new
investments. The following statistics are cited from Verizon’s 2023 Data Breach
Investigations Report:

0

OF BREACHES INVOLVED EXTERNAL ACTORS—WITH THE MAJORITY BEING FINANCIALLY
MOTIVATED.



0

OF BREACHES INVOLVED THE HUMAN ELEMENT, WHICH INCLUDES SOCIAL ENGINEERING
ATTACKS, ERRORS OR MISUSE.



0

OF ALL SOCIAL ENGINEERING ATTACKS ARE PRETEXTING INCIDENTS—NEARLY DOUBLE LAST
YEAR’S TOTAL.



Process


CANARY TRAP’S 5-STEP APPROACH FOR EFFECTIVE SECURITY TESTING AND ASSESSMENTS



Define   /   Uncover   /   Report   /   Remediate   /   Retest 

Canary Trap combines human expertise with sophisticated tools and, where
appropriate, threat intelligence to ensure a thorough, in-depth approach to
security testing and assessments.

Our 5-step approach has been developed leveraging years of experience working on
countless engagements with customers of every size, shape and industry type.

To learn more about Canary Trap’s 5-step approach for effective security testing
and assessments please watch the video.




GIVING YOU ALL THE REASONS TO
DO BUSINESS WITH CANARY TRAP



 * ELITE TEAM

Canary Trap was founded by ethical hackers and security experts who share in the
common goal of reducing the potential risk and associated impact of a security
breach.



 * EXPERIENCED AND CERTIFIED

Canary Trap’s elite team of security experts have years of experience and
maintain all necessary certifications to deliver high quality engagements across
our Service Catalogue.


 * CUSTOMER FOCUS

You say “jump” and we say, “how high?” Our client-first, can-do attitude enables
us to offer customers the ultimate flexibility to achieve underlying goals and
meet specific requirements.

 * BESPOKE VS. ONE SIZE FITS ALL

Every project is unique. We will deliver a Statement of Work specific to your
engagement that clearly articulates the Project Scope, Methodology, Key
Deliverables and Costs associated.


 * DIVERSITY OF APPROACH

Canary Trap’s elite team of security experts come from diverse backgrounds. We
will assign the right resource(s) to ensure a thorough and detailed approach to
your specific project.


 * PRAGMATIC REPORTING

Canary Trap takes a sensible and realistic approach when assessing the risk(s)
and impact(s) to our clients. Every report is handcrafted and incorporates
practical knowledge to remediate.

News


INDUSTRY NEWS


 * All
 * Industry News
 * News
 * Uncategorized

All          Industry News          News          Uncategorized          

ETHICAL & LEGAL CONSIDERATIONS

Penetration testing, or ethical hacking, has become a key process for
organizations to identify and correct vulnerabilities in their systems before
they can be exploited by cybercriminals. However, there are ethical and legal
considerations that organizations must take into account in order to
successfully conduct penetration testing in a responsible manner. Gillam, Jason.
2023. “What […]



Read more


RISK-BASED PATCH MANAGEMENT

Risk-Based Patch Management assists IT teams in optimizing their time by
identifying the priority of threats. By prioritizing the mitigation of critical
threats, it enables the team to concentrate their efforts on addressing the most
urgent vulnerabilities. This approach allows the team to make significant
progress in establishing an effective patch management strategy while ensuring
[…]



Read more


BBC, BA SUFFER DATA BREACHES IN WAKE OF MOVEIT ATTACKS

The BBC, British Airways and Boots have all confirmed data breaches as a result
of an attack on Zellis, a British enterprise payroll provider.

Zellis has fallen victim to exploitation of a zero day (previously unknown)
vulnerability in enterprise file transfer software “MOVEit Transfer.”



Read more


TOYOTA DISCLOSES NEW DATA BREACH INVOLVING VEHICLE, CUSTOMER INFORMATION

Japanese car maker Toyota this week announced that cloud configuration issues
have led to years-long exposure of customer data.

The impacted environments, which are managed by Toyota Connected Corporation
(TC), contain information related to the vehicles of Japanese customers, as well
as the personal information of customers overseas.



Read more






Canary Trap is a focused cybersecurity services provider offering robust
security services to private and public-sector organizations.

Our goal is to improve the security hygiene and resiliency of our client
organizations.



CONTACT

 * P: (844) 750-2018
 * E: inquiries@canarytrap.com

MISSISSAUGA (CAN HQ)

 * 2425 Matheson Boulevard East
 * 8th Floor
 * Mississauga, Ontario
 * L4W 5K4
 * 
   

BUFFALO (USA HQ)

 * 50 Fountain Plaza
 * Suite 1400
 * Buffalo, New York
 * 14202
 * 
   

WINNIPEG

 * 201 Portage Avenue
 * 18th Floor
 * Winnipeg, Manitoba
 * R3B 3K6
 * 
   

TAMPA

 * 4830 West Kennedy Boulevard
 * Suite 600
 * Tampa, Florida
 * 33609
 * 
   

© 2023 Canary Trap. All rights reserved | Privacy Policy To Top

 * 
 * Experiencing a Security Breach?
   
   Call (844) 750-2018
   
   Contact us


CANARY TRAP

×

Take the next step to
engage with Canary Trap

If you require our cybersecurity services please share your details below and we
will be in touch!


POPUP FORM



 * Full Name*
   
 * Email Address*
   
 * Phone*
   
 * Untitled*
   
 * CAPTCHA
   
 * Email
   
   This field is for validation purposes and should be left unchanged.


(844) 750-2018

OR

inquiries@canarytrap.com
Your inquiry has been submitted successfully

Notifications