www.canarytrap.com
Open in
urlscan Pro
35.203.37.123
Public Scan
Submitted URL: http://www.canarytrap.com/
Effective URL: https://www.canarytrap.com/
Submission: On June 07 via manual from US — Scanned from CA
Effective URL: https://www.canarytrap.com/
Submission: On June 07 via manual from US — Scanned from CA
Form analysis
1 forms found in the DOMPOST /
<form method="post" enctype="multipart/form-data" target="gform_ajax_frame_2" id="gform_2" action="/" data-formid="2">
<div class="gform-body gform_body">
<ul id="gform_fields_2" class="gform_fields top_label form_sublabel_below description_below">
<li id="field_2_7" class="gfield gfield--type-text gfield_contains_required field_sublabel_below gfield--no-description field_description_below hidden_label gfield_visibility_visible" data-js-reload="field_2_7"><label
class="gfield_label gform-field-label" for="input_2_7">Full Name<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
<div class="ginput_container ginput_container_text"><input name="input_7" id="input_2_7" type="text" value="" class="large" placeholder="Full Name" aria-required="true" aria-invalid="false"> </div>
</li>
<li id="field_2_4" class="gfield gfield--type-email gfield_contains_required field_sublabel_below gfield--no-description field_description_above hidden_label gfield_visibility_visible" data-js-reload="field_2_4"><label
class="gfield_label gform-field-label" for="input_2_4">Email Address<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
<div class="ginput_container ginput_container_email">
<input name="input_4" id="input_2_4" type="text" value="" class="medium" placeholder="Email Address" aria-required="true" aria-invalid="false">
</div>
</li>
<li id="field_2_5" class="gfield gfield--type-phone gfield_contains_required field_sublabel_below gfield--no-description field_description_below hidden_label gfield_visibility_visible" data-js-reload="field_2_5"><label
class="gfield_label gform-field-label" for="input_2_5">Phone<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
<div class="ginput_container ginput_container_phone"><input name="input_5" id="input_2_5" type="text" value="" class="large" placeholder="Phone" aria-required="true" aria-invalid="false"></div>
</li>
<li id="field_2_6" class="gfield gfield--type-textarea gfield_contains_required field_sublabel_below gfield--no-description field_description_below hidden_label gfield_visibility_visible" data-js-reload="field_2_6"><label
class="gfield_label gform-field-label" for="input_2_6">Untitled<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
<div class="ginput_container ginput_container_textarea"><textarea name="input_6" id="input_2_6" class="textarea small" placeholder="Enter a brief description of your inquiry." aria-required="true" aria-invalid="false" rows="10"
cols="50"></textarea></div>
</li>
<li id="field_2_8" class="gfield gfield--type-captcha field_sublabel_below gfield--no-description field_description_below hidden_label gfield_visibility_visible" data-js-reload="field_2_8"><label class="gfield_label gform-field-label"
for="input_2_8">CAPTCHA</label>
<div id="input_2_8" class="ginput_container ginput_recaptcha gform-initialized" data-sitekey="6Le6HK8ZAAAAALluNNUqvnvBM0N2wj3u9imZ6sgX" data-theme="light" data-tabindex="-1" data-size="invisible" data-badge="bottomright">
<div class="grecaptcha-badge" data-style="bottomright"
style="width: 256px; height: 60px; position: fixed; visibility: hidden; display: block; transition: right 0.3s ease 0s; bottom: 14px; right: -186px; box-shadow: gray 0px 0px 5px; border-radius: 2px; overflow: hidden;">
<div class="grecaptcha-logo"><iframe title="reCAPTCHA"
src="https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Le6HK8ZAAAAALluNNUqvnvBM0N2wj3u9imZ6sgX&co=aHR0cHM6Ly93d3cuY2FuYXJ5dHJhcC5jb206NDQz&hl=en&v=Xh5Zjh8Od10-SgxpI_tcSnHR&theme=light&size=invisible&badge=bottomright&cb=usjxf7up78c6"
width="256" height="60" role="presentation" name="a-ib3mrthmuu4r" frameborder="0" scrolling="no" sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"
tabindex="-1"></iframe></div>
<div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
</div><iframe style="display: none;"></iframe>
</div>
</li>
<li id="field_2_9" class="gfield gfield--type-honeypot gform_validation_container field_sublabel_below gfield--has-description field_description_below gfield_visibility_visible" data-js-reload="field_2_9"><label
class="gfield_label gform-field-label" for="input_2_9">Phone</label>
<div class="ginput_container"><input name="input_9" id="input_2_9" type="text" value=""></div>
<div class="gfield_description" id="gfield_description_2_9">This field is for validation purposes and should be left unchanged.</div>
</li>
</ul>
</div>
<div class="gform_footer top_label"> <input type="submit" id="gform_submit_button_2" class="gform_button button" value="Send" onclick="if(window["gf_submitting_2"]){return false;} window["gf_submitting_2"]=true; "
onkeypress="if( event.keyCode == 13 ){ if(window["gf_submitting_2"]){return false;} window["gf_submitting_2"]=true; jQuery("#gform_2").trigger("submit",[true]); }"> <input type="hidden" name="gform_ajax"
value="form_id=2&title=1&description=1&tabindex=0">
<input type="hidden" class="gform_hidden" name="is_submit_2" value="1">
<input type="hidden" class="gform_hidden" name="gform_submit" value="2">
<input type="hidden" class="gform_hidden" name="gform_unique_id" value="">
<input type="hidden" class="gform_hidden" name="state_2" value="WyJbXSIsIjkzYWI5NjVkYmQzODY0NDRhZmM0Y2VjYjM3ZTk3MzljIl0=">
<input type="hidden" class="gform_hidden" name="gform_target_page_number_2" id="gform_target_page_number_2" value="0">
<input type="hidden" class="gform_hidden" name="gform_source_page_number_2" id="gform_source_page_number_2" value="1">
<input type="hidden" name="gform_field_values" value="">
</div>
</form>
Text Content
* Home * Corporate * About Us * Corporate Values * Social Responsibility * What is a Canary Trap? * Careers * Services * External Vulnerability Assessment & Penetration Testing * Internal Network Penetration Testing * Wireless Security Testing * Web & Mobile Application Penetration Testing * Instructor-Led Security Awareness Training * Threat Risk Assessment * Secure Code Review * Compromise Assessment – Active Threat * Compromise Assessment – Security Controls * Digital Forensics & e-Discovery * Cybersecurity Incident Management Planning * Resources * Scoping Questionnaire * Blog * Industry News * Studies & Reports * Certificate * Contact * Submit an Inquiry * Locations * Home * Corporate * About Us * Corporate Values * Social Responsibility * What is a Canary Trap? * Careers * Services * External Vulnerability Assessment & Penetration Testing * Internal Network Penetration Testing * Wireless Security Testing * Web & Mobile Application Penetration Testing * Instructor-Led Security Awareness Training * Threat Risk Assessment * Secure Code Review * Compromise Assessment – Active Threat * Compromise Assessment – Security Controls * Digital Forensics & e-Discovery * Cybersecurity Incident Management Planning * Resources * Scoping Questionnaire * Blog * Industry News * Studies & Reports * Certificate * Contact * Submit an Inquiry * Locations © Canary Trap 2023 All Rights Reserved Share CANARY TRAP TAKING A PRAGMATIC, RISK-BASED APPROACH TO ASSESSING SECURITY HYGIENE AND RESILIENCY. Canary Trap understands that cybersecurity is no longer an IT problem; it’s a BUSINESS problem! Our reports are written for an executive audience and focus on risk and impact; not 1s and 0s or bits and bytes. SERVICING SMALL BUSINESS TO GLOBAL ENTERPRISE. Canary Trap is engaged by organizations of all shapes, sizes and industry types. OFFERING UNPARALLELED SECURITY EXPERTISE. Canary Trap aims to be your partner in helping to solve the enterprise security challenge effectively and efficiently. CATCHING VULNERABILITIES AND TRAPPING EXPLOITS. Canary Trap is a recognized leader in offensive security testing. We have the expertise, experience and credentials to help ensure that your networks, data, employees web and mobile applications are secure. DRIVING SECURITY AWARENESS WITH THE BOARD & EXECUTIVE LEADERSHIP TEAM. You’re only as strong as your weakest link. Canary Trap has developed a high-impact, instructor-led Security Awareness Training program for Directors & Officers (and Employees). ENSURING CLIENT SATISFACTION THROUGH QUALITY ASSURANCE. Canary Trap’s job isn’t done until you’re completely satisfied. Our quality assurance process ensures ALL findings are validated through peer review. Every report generated is checked for formatting, grammar and subject matter before being published. TAKING A PRAGMATIC, RISK-BASED APPROACH TO ASSESSING SECURITY HYGIENE AND RESILIENCY. Canary Trap understands that cybersecurity is no longer an IT problem; it’s a BUSINESS problem! Our reports are written for an executive audience and focus on risk and impact; not 1s and 0s or bits and bytes. SERVICING SMALL BUSINESS TO GLOBAL ENTERPRISE. Canary Trap is engaged by organizations of all shapes, sizes and industry types. OFFERING UNPARALLELED SECURITY EXPERTISE. Canary Trap aims to be your partner in helping to solve the enterprise security challenge effectively and efficiently. CATCHING VULNERABILITIES AND TRAPPING EXPLOITS. Canary Trap is a recognized leader in offensive security testing. We have the expertise, experience and credentials to help ensure that your networks, data, employees web and mobile applications are secure. DRIVING SECURITY AWARENESS WITH THE BOARD & EXECUTIVE LEADERSHIP TEAM. You’re only as strong as your weakest link. Canary Trap has developed a high-impact, instructor-led Security Awareness Training program for Directors & Officers (and Employees). ENSURING CLIENT SATISFACTION THROUGH QUALITY ASSURANCE. Canary Trap’s job isn’t done until you’re completely satisfied. Our quality assurance process ensures ALL findings are validated through peer review. Every report generated is checked for formatting, grammar and subject matter before being published. ‹› Services EXPERTS IN CYBERSECURITY. Canary Trap’s elite team of security experts come armed with the necessary experience, credentials and tools to help improve your organization’s security resiliency and cyber risk posture. We offer a robust, albeit highly focused Services Catalogue: EXTERNAL VULNERABILITY ASSESSMENT & PENETRATION TESTING Identify how cyber criminals can disrupt IT systems, steal data and harm brand reputation from outside of your network. INTERNAL NETWORK PENETRATION TESTING Identify security vulnerabilities that exist within the corporate network. Most cyber insurers require annual internal testing. WIRELESS SECURITY ASSESSMENT Tests the security of your wireless network(s) by attempting to gain unauthorized access -or- manipulating employee network traffic. WEB & MOBILE APPLICATION TESTING Identify, enumerate and resolve any security vulnerabilities within your mission and business-critical applications. INSTRUCTOR-LED SECURITY AWARENESS TRAINING You’re only as strong as your weakest link. Take a hands-on approach to educating your Board and Executive Leadership Team on the latest cyber threats. THREAT RISK ASSESSMENT Generally driven by compliance, a Threat Risk Assessment is performed to assess and report on security risks to target information systems. SECURE CODE REVIEW Analyzes source code to identify and report on errors, defects, bugs and security vulnerabilities. COMPROMISE ASSESSMENT – ACTIVE THREAT Identify if your corporate IT infrastructure has been compromised through the network, servers and computers for malicious activities. COMPROMISE ASSESSMENT – SECURITY CONTROLS Assess how difficult it is for a sophisticated threat actor to bypass your existing security controls. DIGITAL FORENSICS & e-DISCOVERY The process of identification, preservation, extraction, and documentation of digital evidence which can be used in a court of law. CYBERSECURITY INCIDENT MANAGEMENT PLANNING Develop tailored policies to ensure that security incidents can be managed effectively and efficiently in order to mitigate risk and impact. READY TO START A SERVICE? Visit our scoping questionnaire page and fill out your form today! Scoping Questionnaire SECURITY AWARENESS Cybersecurity is an investment, not a cost center. It’s important for IT leaders to make security business contextual when building the business case for new investments. The following statistics are cited from Verizon’s 2022 Data Breach Investigations Report: 0 OF BREACHES INVOLVED THE HUMAN ELEMENT, INCLUDING SOCIAL ATTACKS, ERRORS AND MISUSE. 0 INCREASE IN RANSOMWARE BREACHES – MORE THAN IN THE LAST 5 YEARS COMBINED! 0 OF INCIDENTS IN THE SYSTEM INTRUSION PATTERN INVOLVED THREAT ACTORS COMPROMISING PARTNERS. Process CANARY TRAP’S 5-STEP APPROACH FOR EFFECTIVE SECURITY TESTING AND ASSESSMENTS Define / Uncover / Report / Remediate / Retest Canary Trap combines human expertise with sophisticated tools and, where appropriate, threat intelligence to ensure a thorough, in-depth approach to security testing and assessments. Our 5-step approach has been developed leveraging years of experience working on countless engagements with customers of every size, shape and industry type. To learn more about Canary Trap’s 5-step approach for effective security testing and assessments please watch the video. GIVING YOU ALL THE REASONS TO DO BUSINESS WITH CANARY TRAP * ELITE TEAM Canary Trap was founded by ethical hackers and security experts who share in the common goal of reducing the potential risk and associated impact of a security breach. * EXPERIENCED AND CERTIFIED Canary Trap’s elite team of security experts have years of experience and maintain all necessary certifications to deliver high quality engagements across our Service Catalogue. * CUSTOMER FOCUS You say “jump” and we say, “how high?” Our client-first, can-do attitude enables us to offer customers the ultimate flexibility to achieve underlying goals and meet specific requirements. * BESPOKE VS. ONE SIZE FITS ALL Every project is unique. We will deliver a Statement of Work specific to your engagement that clearly articulates the Project Scope, Methodology, Key Deliverables and Costs associated. * DIVERSITY OF APPROACH Canary Trap’s elite team of security experts come from diverse backgrounds. We will assign the right resource(s) to ensure a thorough and detailed approach to your specific project. * PRAGMATIC REPORTING Canary Trap takes a sensible and realistic approach when assessing the risk(s) and impact(s) to our clients. Every report is handcrafted and incorporates practical knowledge to remediate. News INDUSTRY NEWS * All * Industry News All Industry News TOYOTA DISCLOSES NEW DATA BREACH INVOLVING VEHICLE, CUSTOMER INFORMATION Japanese car maker Toyota this week announced that cloud configuration issues have led to years-long exposure of customer data. The impacted environments, which are managed by Toyota Connected Corporation (TC), contain information related to the vehicles of Japanese customers, as well as the personal information of customers overseas. Read more RANSOMWARE TARGETING VMWARE VULNERABILITY HAS HIT HUNDREDS OF SERVERS IN US, CANADA The firm’s data, which was initially reported by Bleeping Computer, shows that 362 servers in the U.S. and 240 servers in Canada had been affected by the ransomware, as of this writing. More than 2,400 servers running the VMware ESXi hypervisor are currently impacted in total, and the U.S. and Canada rank second and fourth, respectively, in terms of […] Read more THE EMERGING CYBERSECURITY TRENDS IN 2023 The sophistication of the technology employed by threat actors has increased along with the number of threats. Data has evolved as an essential resource of an intelligent business, used for everything from daily operations to developing long-term plans. Data security becomes increasingly tricky as its value and business importance increase. Organizations are becoming aware of […] Read more SICKKIDS STILL DEALING WITH CYBERSECURITY ISSUES In the two weeks since the Hospital for Sick Children in Toronto was the target of a ransomware attack, the institution continues to deal with cybersecurity issues. Nick Westoll reports. It’s been two weeks since the Hospital for Sick Kids was the target of a ransomware attack, and not only are sick kids staff still […] Read more Canary Trap is a focused cybersecurity services provider offering robust security services to private and public-sector organizations. Our goal is to improve the security hygiene and resiliency of our client organizations. CONTACT * P: (844) 750-2018 * E: inquiries@canarytrap.com MISSISSAUGA (CAN HQ) * 2425 Matheson Boulevard East * 8th Floor * Mississauga, Ontario * L4W 5K4 * BUFFALO (USA HQ) * 50 Fountain Plaza * Suite 1400 * Buffalo, New York * 14202 * WINNIPEG * 201 Portage Avenue * 18th Floor * Winnipeg, Manitoba * R3B 3K6 * TAMPA * 4830 West Kennedy Boulevard * Suite 600 * Tampa, Florida * 33609 * © 2023 Canary Trap. All rights reserved | Privacy Policy To Top * * Experiencing a Security Breach? Call (844) 750-2018 Contact us CANARY TRAP × Take the next step to engage with Canary Trap If you require our cybersecurity services please share your details below and we will be in touch! POPUP FORM * Full Name* * Email Address* * Phone* * Untitled* * CAPTCHA * Phone This field is for validation purposes and should be left unchanged. (844) 750-2018 OR inquiries@canarytrap.com Your inquiry has been submitted successfully Notifications