www.canarytrap.com Open in urlscan Pro
35.203.37.123  Public Scan

Submitted URL: http://www.canarytrap.com/
Effective URL: https://www.canarytrap.com/
Submission: On June 07 via manual from US — Scanned from CA

Form analysis 1 forms found in the DOM

POST /

<form method="post" enctype="multipart/form-data" target="gform_ajax_frame_2" id="gform_2" action="/" data-formid="2">
  <div class="gform-body gform_body">
    <ul id="gform_fields_2" class="gform_fields top_label form_sublabel_below description_below">
      <li id="field_2_7" class="gfield gfield--type-text gfield_contains_required field_sublabel_below gfield--no-description field_description_below hidden_label gfield_visibility_visible" data-js-reload="field_2_7"><label
          class="gfield_label gform-field-label" for="input_2_7">Full Name<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
        <div class="ginput_container ginput_container_text"><input name="input_7" id="input_2_7" type="text" value="" class="large" placeholder="Full Name" aria-required="true" aria-invalid="false"> </div>
      </li>
      <li id="field_2_4" class="gfield gfield--type-email gfield_contains_required field_sublabel_below gfield--no-description field_description_above hidden_label gfield_visibility_visible" data-js-reload="field_2_4"><label
          class="gfield_label gform-field-label" for="input_2_4">Email Address<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
        <div class="ginput_container ginput_container_email">
          <input name="input_4" id="input_2_4" type="text" value="" class="medium" placeholder="Email Address" aria-required="true" aria-invalid="false">
        </div>
      </li>
      <li id="field_2_5" class="gfield gfield--type-phone gfield_contains_required field_sublabel_below gfield--no-description field_description_below hidden_label gfield_visibility_visible" data-js-reload="field_2_5"><label
          class="gfield_label gform-field-label" for="input_2_5">Phone<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
        <div class="ginput_container ginput_container_phone"><input name="input_5" id="input_2_5" type="text" value="" class="large" placeholder="Phone" aria-required="true" aria-invalid="false"></div>
      </li>
      <li id="field_2_6" class="gfield gfield--type-textarea gfield_contains_required field_sublabel_below gfield--no-description field_description_below hidden_label gfield_visibility_visible" data-js-reload="field_2_6"><label
          class="gfield_label gform-field-label" for="input_2_6">Untitled<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
        <div class="ginput_container ginput_container_textarea"><textarea name="input_6" id="input_2_6" class="textarea small" placeholder="Enter a brief description of your inquiry." aria-required="true" aria-invalid="false" rows="10"
            cols="50"></textarea></div>
      </li>
      <li id="field_2_8" class="gfield gfield--type-captcha field_sublabel_below gfield--no-description field_description_below hidden_label gfield_visibility_visible" data-js-reload="field_2_8"><label class="gfield_label gform-field-label"
          for="input_2_8">CAPTCHA</label>
        <div id="input_2_8" class="ginput_container ginput_recaptcha gform-initialized" data-sitekey="6Le6HK8ZAAAAALluNNUqvnvBM0N2wj3u9imZ6sgX" data-theme="light" data-tabindex="-1" data-size="invisible" data-badge="bottomright">
          <div class="grecaptcha-badge" data-style="bottomright"
            style="width: 256px; height: 60px; position: fixed; visibility: hidden; display: block; transition: right 0.3s ease 0s; bottom: 14px; right: -186px; box-shadow: gray 0px 0px 5px; border-radius: 2px; overflow: hidden;">
            <div class="grecaptcha-logo"><iframe title="reCAPTCHA"
                src="https://www.google.com/recaptcha/api2/anchor?ar=1&amp;k=6Le6HK8ZAAAAALluNNUqvnvBM0N2wj3u9imZ6sgX&amp;co=aHR0cHM6Ly93d3cuY2FuYXJ5dHJhcC5jb206NDQz&amp;hl=en&amp;v=Xh5Zjh8Od10-SgxpI_tcSnHR&amp;theme=light&amp;size=invisible&amp;badge=bottomright&amp;cb=usjxf7up78c6"
                width="256" height="60" role="presentation" name="a-ib3mrthmuu4r" frameborder="0" scrolling="no" sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"
                tabindex="-1"></iframe></div>
            <div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
              style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
          </div><iframe style="display: none;"></iframe>
        </div>
      </li>
      <li id="field_2_9" class="gfield gfield--type-honeypot gform_validation_container field_sublabel_below gfield--has-description field_description_below gfield_visibility_visible" data-js-reload="field_2_9"><label
          class="gfield_label gform-field-label" for="input_2_9">Phone</label>
        <div class="ginput_container"><input name="input_9" id="input_2_9" type="text" value=""></div>
        <div class="gfield_description" id="gfield_description_2_9">This field is for validation purposes and should be left unchanged.</div>
      </li>
    </ul>
  </div>
  <div class="gform_footer top_label"> <input type="submit" id="gform_submit_button_2" class="gform_button button" value="Send" onclick="if(window[&quot;gf_submitting_2&quot;]){return false;}  window[&quot;gf_submitting_2&quot;]=true;  "
      onkeypress="if( event.keyCode == 13 ){ if(window[&quot;gf_submitting_2&quot;]){return false;} window[&quot;gf_submitting_2&quot;]=true;  jQuery(&quot;#gform_2&quot;).trigger(&quot;submit&quot;,[true]); }"> <input type="hidden" name="gform_ajax"
      value="form_id=2&amp;title=1&amp;description=1&amp;tabindex=0">
    <input type="hidden" class="gform_hidden" name="is_submit_2" value="1">
    <input type="hidden" class="gform_hidden" name="gform_submit" value="2">
    <input type="hidden" class="gform_hidden" name="gform_unique_id" value="">
    <input type="hidden" class="gform_hidden" name="state_2" value="WyJbXSIsIjkzYWI5NjVkYmQzODY0NDRhZmM0Y2VjYjM3ZTk3MzljIl0=">
    <input type="hidden" class="gform_hidden" name="gform_target_page_number_2" id="gform_target_page_number_2" value="0">
    <input type="hidden" class="gform_hidden" name="gform_source_page_number_2" id="gform_source_page_number_2" value="1">
    <input type="hidden" name="gform_field_values" value="">
  </div>
</form>

Text Content

 * Home
 * Corporate
   * About Us
   * Corporate Values
   * Social Responsibility
   * What is a Canary Trap?
   * Careers
 * Services
   * External Vulnerability Assessment & Penetration Testing
   * Internal Network Penetration Testing
   * Wireless Security Testing
   * Web & Mobile Application Penetration Testing
   * Instructor-Led Security Awareness Training
   * Threat Risk Assessment
   * Secure Code Review
   * Compromise Assessment – Active Threat
   * Compromise Assessment – Security Controls
   * Digital Forensics & e-Discovery
   * Cybersecurity Incident Management Planning
 * Resources
   * Scoping Questionnaire
   * Blog
   * Industry News
   * Studies & Reports
 * Certificate
 * Contact
   * Submit an Inquiry
   * Locations

 * Home
 * Corporate
   * About Us
   * Corporate Values
   * Social Responsibility
   * What is a Canary Trap?
   * Careers
 * Services
   * External Vulnerability Assessment & Penetration Testing
   * Internal Network Penetration Testing
   * Wireless Security Testing
   * Web & Mobile Application Penetration Testing
   * Instructor-Led Security Awareness Training
   * Threat Risk Assessment
   * Secure Code Review
   * Compromise Assessment – Active Threat
   * Compromise Assessment – Security Controls
   * Digital Forensics & e-Discovery
   * Cybersecurity Incident Management Planning
 * Resources
   * Scoping Questionnaire
   * Blog
   * Industry News
   * Studies & Reports
 * Certificate
 * Contact
   * Submit an Inquiry
   * Locations

© Canary Trap 2023 All Rights Reserved
Share





CANARY TRAP


TAKING A PRAGMATIC, RISK-BASED APPROACH TO ASSESSING SECURITY HYGIENE AND
RESILIENCY.

Canary Trap understands that cybersecurity is no longer an IT problem; it’s a
BUSINESS problem! Our reports are written for an executive audience and focus on
risk and impact; not 1s and 0s or bits and bytes.


SERVICING SMALL BUSINESS TO GLOBAL ENTERPRISE.

Canary Trap is engaged by organizations of all shapes, sizes and industry types.


OFFERING UNPARALLELED SECURITY EXPERTISE.

Canary Trap aims to be your partner in helping to solve the enterprise security
challenge effectively and efficiently.


CATCHING VULNERABILITIES AND TRAPPING EXPLOITS.

Canary Trap is a recognized leader in offensive security testing. We have the
expertise, experience and credentials to help ensure that your networks, data,
employees web and mobile applications are secure.


DRIVING SECURITY AWARENESS WITH THE BOARD & EXECUTIVE LEADERSHIP TEAM.

You’re only as strong as your weakest link. Canary Trap has developed a
high-impact, instructor-led Security Awareness Training program for Directors &
Officers (and Employees).


ENSURING CLIENT SATISFACTION THROUGH QUALITY ASSURANCE.

Canary Trap’s job isn’t done until you’re completely satisfied. Our quality
assurance process ensures ALL findings are validated through peer review. Every
report generated is checked for formatting, grammar and subject matter before
being published.


TAKING A PRAGMATIC, RISK-BASED APPROACH TO ASSESSING SECURITY HYGIENE AND
RESILIENCY.

Canary Trap understands that cybersecurity is no longer an IT problem; it’s a
BUSINESS problem! Our reports are written for an executive audience and focus on
risk and impact; not 1s and 0s or bits and bytes.


SERVICING SMALL BUSINESS TO GLOBAL ENTERPRISE.

Canary Trap is engaged by organizations of all shapes, sizes and industry types.


OFFERING UNPARALLELED SECURITY EXPERTISE.

Canary Trap aims to be your partner in helping to solve the enterprise security
challenge effectively and efficiently.


CATCHING VULNERABILITIES AND TRAPPING EXPLOITS.

Canary Trap is a recognized leader in offensive security testing. We have the
expertise, experience and credentials to help ensure that your networks, data,
employees web and mobile applications are secure.


DRIVING SECURITY AWARENESS WITH THE BOARD & EXECUTIVE LEADERSHIP TEAM.

You’re only as strong as your weakest link. Canary Trap has developed a
high-impact, instructor-led Security Awareness Training program for Directors &
Officers (and Employees).


ENSURING CLIENT SATISFACTION THROUGH QUALITY ASSURANCE.

Canary Trap’s job isn’t done until you’re completely satisfied. Our quality
assurance process ensures ALL findings are validated through peer review. Every
report generated is checked for formatting, grammar and subject matter before
being published.

‹›




Services


EXPERTS IN CYBERSECURITY.



Canary Trap’s elite team of security experts come armed with the necessary
experience, credentials and tools to help improve your organization’s security
resiliency and cyber risk posture. We offer a robust, albeit highly focused
Services Catalogue:



EXTERNAL VULNERABILITY ASSESSMENT & PENETRATION TESTING



Identify how cyber criminals can disrupt IT systems, steal data and harm brand
reputation from outside of your network.



INTERNAL NETWORK PENETRATION TESTING



Identify security vulnerabilities that exist within the corporate network. Most
cyber insurers require annual internal testing.



WIRELESS SECURITY ASSESSMENT



Tests the security of your wireless network(s) by attempting to gain
unauthorized access -or- manipulating employee network traffic.



WEB & MOBILE APPLICATION TESTING



Identify, enumerate and resolve any security vulnerabilities within your mission
and business-critical applications.




INSTRUCTOR-LED SECURITY AWARENESS TRAINING



You’re only as strong as your weakest link. Take a hands-on approach to
educating your Board and Executive Leadership Team on the latest cyber threats.



THREAT RISK ASSESSMENT



Generally driven by compliance, a Threat Risk Assessment is performed to assess
and report on security risks to target information systems.



SECURE CODE REVIEW



Analyzes source code to identify and report on errors, defects, bugs and
security vulnerabilities.



COMPROMISE ASSESSMENT – ACTIVE THREAT



Identify if your corporate IT infrastructure has been compromised through the
network, servers and computers for malicious activities.




COMPROMISE ASSESSMENT – SECURITY CONTROLS



Assess how difficult it is for a sophisticated threat actor to bypass your
existing security controls.



DIGITAL FORENSICS & e-DISCOVERY



The process of identification, preservation, extraction, and documentation of
digital evidence which can be used in a court of law.



CYBERSECURITY INCIDENT MANAGEMENT PLANNING



Develop tailored policies to ensure that security incidents can be managed
effectively and efficiently in order to mitigate risk and impact.



READY TO START A SERVICE?



Visit our scoping questionnaire page and fill out your form today!


Scoping Questionnaire


SECURITY
AWARENESS

Cybersecurity is an investment, not a cost center. It’s important for IT leaders
to make security business contextual when building the business case for new
investments. The following statistics are cited from Verizon’s 2022 Data Breach
Investigations Report:

0

OF BREACHES INVOLVED THE HUMAN ELEMENT, INCLUDING SOCIAL ATTACKS, ERRORS AND
MISUSE.



0

INCREASE IN RANSOMWARE BREACHES – MORE THAN IN THE LAST 5 YEARS COMBINED!



0

OF INCIDENTS IN THE SYSTEM INTRUSION PATTERN INVOLVED THREAT ACTORS COMPROMISING
PARTNERS.



Process


CANARY TRAP’S 5-STEP APPROACH FOR EFFECTIVE SECURITY TESTING AND ASSESSMENTS



Define   /   Uncover   /   Report   /   Remediate   /   Retest 

Canary Trap combines human expertise with sophisticated tools and, where
appropriate, threat intelligence to ensure a thorough, in-depth approach to
security testing and assessments.

Our 5-step approach has been developed leveraging years of experience working on
countless engagements with customers of every size, shape and industry type.

To learn more about Canary Trap’s 5-step approach for effective security testing
and assessments please watch the video.




GIVING YOU ALL THE REASONS TO
DO BUSINESS WITH CANARY TRAP



 * ELITE TEAM

Canary Trap was founded by ethical hackers and security experts who share in the
common goal of reducing the potential risk and associated impact of a security
breach.



 * EXPERIENCED AND CERTIFIED

Canary Trap’s elite team of security experts have years of experience and
maintain all necessary certifications to deliver high quality engagements across
our Service Catalogue.


 * CUSTOMER FOCUS

You say “jump” and we say, “how high?” Our client-first, can-do attitude enables
us to offer customers the ultimate flexibility to achieve underlying goals and
meet specific requirements.

 * BESPOKE VS. ONE SIZE FITS ALL

Every project is unique. We will deliver a Statement of Work specific to your
engagement that clearly articulates the Project Scope, Methodology, Key
Deliverables and Costs associated.


 * DIVERSITY OF APPROACH

Canary Trap’s elite team of security experts come from diverse backgrounds. We
will assign the right resource(s) to ensure a thorough and detailed approach to
your specific project.


 * PRAGMATIC REPORTING

Canary Trap takes a sensible and realistic approach when assessing the risk(s)
and impact(s) to our clients. Every report is handcrafted and incorporates
practical knowledge to remediate.

News


INDUSTRY NEWS


 * All
 * Industry News

All          Industry News          

TOYOTA DISCLOSES NEW DATA BREACH INVOLVING VEHICLE, CUSTOMER INFORMATION

Japanese car maker Toyota this week announced that cloud configuration issues
have led to years-long exposure of customer data.

The impacted environments, which are managed by Toyota Connected Corporation
(TC), contain information related to the vehicles of Japanese customers, as well
as the personal information of customers overseas.



Read more


RANSOMWARE TARGETING VMWARE VULNERABILITY HAS HIT HUNDREDS OF SERVERS IN US,
CANADA

The firm’s data, which was initially reported by Bleeping Computer, shows
that 362 servers in the U.S. and 240 servers in Canada had been affected by the
ransomware, as of this writing. More than 2,400 servers running the VMware ESXi
hypervisor are currently impacted in total, and the U.S. and Canada rank second
and fourth, respectively, in terms of […]



Read more


THE EMERGING CYBERSECURITY TRENDS IN 2023

The sophistication of the technology employed by threat actors has increased
along with the number of threats. Data has evolved as an essential resource of
an intelligent business, used for everything from daily operations to developing
long-term plans. Data security becomes increasingly tricky as its value and
business importance increase. Organizations are becoming aware of […]



Read more


SICKKIDS STILL DEALING WITH CYBERSECURITY ISSUES

In the two weeks since the Hospital for Sick Children in Toronto was the target
of a ransomware attack, the institution continues to deal with cybersecurity
issues. Nick Westoll reports. It’s been two weeks since the Hospital for Sick
Kids was the target of a ransomware attack, and not only are sick kids staff
still […]



Read more




Canary Trap is a focused cybersecurity services provider offering robust
security services to private and public-sector organizations.

Our goal is to improve the security hygiene and resiliency of our client
organizations.



CONTACT

 * P: (844) 750-2018
 * E: inquiries@canarytrap.com

MISSISSAUGA (CAN HQ)

 * 2425 Matheson Boulevard East
 * 8th Floor
 * Mississauga, Ontario
 * L4W 5K4
 * 
   

BUFFALO (USA HQ)

 * 50 Fountain Plaza
 * Suite 1400
 * Buffalo, New York
 * 14202
 * 
   

WINNIPEG

 * 201 Portage Avenue
 * 18th Floor
 * Winnipeg, Manitoba
 * R3B 3K6
 * 
   

TAMPA

 * 4830 West Kennedy Boulevard
 * Suite 600
 * Tampa, Florida
 * 33609
 * 
   

© 2023 Canary Trap. All rights reserved | Privacy Policy To Top

 * 
 * Experiencing a Security Breach?
   
   Call (844) 750-2018
   
   Contact us


CANARY TRAP

×

Take the next step to
engage with Canary Trap

If you require our cybersecurity services please share your details below and we
will be in touch!


POPUP FORM



 * Full Name*
   
 * Email Address*
   
 * Phone*
   
 * Untitled*
   
 * CAPTCHA
   
 * Phone
   
   This field is for validation purposes and should be left unchanged.


(844) 750-2018

OR

inquiries@canarytrap.com
Your inquiry has been submitted successfully

Notifications