Alex's Cyber Security Website

CyberDefense

New Defensive Protection

logo

The seven domains of information technology can be inspected to identify and evaluate relevant vulnerabilities. This can be done through documentation review, system logs, audit trails, and intrusion detection outputs. Furthermore, penetration testing, system testing, functionality testing, access control testing, and applications testing can be done.

Automation of Business

logo

Need your computer screened or just a small repair?

Call us today