Ransomware Assessment Service – Powered by Black Kite

Determine a Partners or Supplier’s Susceptibility to a Successful Ransomware Attack

 

Understand Your Third Party Management Risks

In recent times, there has been a relentless growth in attempts to disrupt legitimate activities on the internet by the hacking fraternity. Motives range from political, through purely malicious, to criminal but the tide has turned, and motives are now clearly for financial gain. Ensuring that you do not become a victim is extremely important. The costs, effects and damage can be life-threatening to your organisation. After a successful attack, life will never be the same again, even if the business survives. Many incidents have occurred in recent times which illustrate the devastating effects of cyber-attacks.

It is apparent, that organisations are not comprehending the risk of operating within a connected world and more recently, the old adage of “you’re only as strong as your weakest link” is ringing true; there has been many examples that demonstrate the devastating impact a 3rd party supplier breach can have to the contracting brand.

You may not be the cause of the breach, but rather a careless supplier may be the ultimate cause, but you will bear the brunt of the negative impact. Rapidly determines a sub-brand / supplier’s susceptibility to ransomware that is delivered as a once-off service but can be extended into a long-term Third-Party Risk Management (TPRM) service if required.

How does it work and what does it identify?

Powered by the Black Kite platform, It uses open-source intelligence (OSINT) techniques to collect data from 400+ OSINT resources from a span of internet-wide scanners. The Platform uses standard scoring models like MITRE Cyber Threat Susceptibility Assessment (CTSA), Common Weakness Risk Analysis Framework (CWRAF), Common Weakness Scoring System (CWSS), Common Vulnerability Scoring System (CVSS), and Factor Analysis of Information Risk (FAIR). 

Specific to identifying susceptibility to a ransomware attack the RSI follows a process of inspecting, transforming, and modelling data with the goal of discovering the likelihood of a ransomware incident. Utilising the Black Kite’s platform whose data is collected from a variety of OSINT sources such as internet-wide scanners, hacker forums, the deep/dark web, and many more.

The service provides an approximation for each supplier/partners susceptibility to ransomware. and provide tangible results within hours.

What are the Indicators to a Ransomware Attack?

The Black Kite platform points out vulnerabilities and attack patterns using 20 categories and over 400 controls as hackers look to exploit you, and your third-party suppliers by typically targeting the following areas:

  1. Open Critical Ports 
  2. Vulnerabilities With Remote Code Execution
  3. Leaked Credentials 
  4. Email Security 
  5. Phishing/Fraudulent Domains

Results are Understandable and Simple.

Simple Reporting

You can perform a bulk importation of your entire supply chain and we will generate reports on the susceptibility of a ransomware attack, as well as for Technical, Financial and Compliance Risk in a matter of minutes. They are then automatically graded with a percentage score of how susceptible they are to a successful ransomware attack. We will then analyse the data and compile into simple, readable reports for supply chain reports, detailed company reports, and ransomware mitigation reports. You can also schedule each type of report and have them automatically sent to the right stakeholders within your business or directly to the supplier if required

Supply Chain reports

A standard report that will give you every vendor, supplier, and 3rd party in one single pane of glass dashboard. You can then sort and rank each supplier based on what is important to you. You can then flag risky suppliers (according to your own defined internal thresholds) for action and then share the reports with your suppliers and create tickets to delegate any necessary follow ups or interventions.

Detailed Company reports

Get a detailed single report on each supplier showing how they compare to other companies in their industry as well as the ransomware indicators that are specific for them

Need a proof of value

For you to validate the platform we can provide a full Proof of Value for up to 5 of your suppliers . This will enable you to get a full understanding of the platform and to see your suppliers susceptibility they are to a ransomware attack as well as their security, compliance and financial risk to you in the event of a breach. 

The Proof-of-Value step are straight forward and are defined as follows:

  1. Complete and return the Risk Assessment Questionnaire
  2. Agree a success criteria 
  3. AEC run an on-line Rapid Assessment of the chosen 5 suppliers
  4. Joint live demonstration against the provided suppliers
  5. AEC present Supply chain overview reports 
  6. AEC Present individual company reports against each supplier
  7. AEC Present remediation reports for each supplier
  8. AEC Present feedback and measures against success criteria

Free Risk Assessment

Do you know the risks that you face, or the risk your suppliers pose to you? Try a free risk assessment to understand the level of detail we can provide for Technical, Compliance and Financial risks.

Key findings from the reports we will share with you about you, your chosen supplier or partner, are as follows:

 

  • Their overall Cyber Rating Score.
  • Their compliance rating across 14 frameworks 
  • What would be the financial impact to you if they are breached
  • How susceptible they are to a Ransomware attack
  • Potential improvements in Cyber Security and compliance
  • Potential reduction in financial risk to you, if there was a breach.
  • Their benchmark in their industry?
  • Their Cyber Security vulnerabilities.
  • Their Cyber Security heat maps.
  • Many more valuable technical, compliance and financial risks. 

Why is Cyber Security Important?

Cyber Security is essential for ensuring the confidentiality, integrity, and availability of services, data, or IT environments. Cyber threats can cause significant damage to an organisation’s reputation, financial stability, and operational capability. Here are a few reasons why Cyber Security is important:

Confidentiality:

Cyber Security helps to ensure that sensitive data and information are kept confidential and are not accessed by unauthorised persons. Confidentiality breaches can result in a loss of trust from customers or stakeholders, legal consequences, and financial losses.

Integrity:

Cyber Security also ensures that data and information are not tampered with or altered in any way. This ensures the accuracy and reliability of data, and prevents intentional or unintentional changes that can result in negative consequences..

Availablity:

Cyber Security measures help to ensure that services, data, and IT environments are available and accessible to authorised users when needed. This ensures that there are no disruptions to business operations and customer service, which can result in financial losses and damage to the organisation’s reputation.

In summary, Cyber Security is essential for protecting an organisation’s assets, reputation, and operational capability. It ensures that confidential data remains confidential, data integrity is maintained, and services are available and accessible when needed. 

Understanding your security weakness and how to address them!

At AEC, we offer a clear and structured 5-step approach to ISO implementation utilising our ISO Management Platform (IMSMLoop) to ensure a smooth and efficient process for your organization across a wide range of ISO standards, and rest assured that the investment quotation we will supply for the development of the ISO management system are fixed, and there will be no additional or hidden charges regardless of the duration or complexity of your business.

Client Feedback and Review

This section highlights testimonials and evaluations from our clients, showcasing how we continuously strive to enhance our services. Your feedback helps us grow and ensures we meet your needs effectively

The Security You Need.
The Compliance to Succeed.

Company

Business Hours

About Us

About Us

Copyright Notice

Information

Work Hours

Terms and Conditions

Business Hours

Contact Info