General Questions

What information is needed to initiate an investigation?

We should have as much information as you can provide. Any additional information, photo, email, old address, names, colleagues, friends, workplaces. Anything can turn out to be a great source of information.

What does it cost?

The service fee consists of two elements - a fixed fee - which is €100 (the initial fee is fixed, regardless of the amount of information found. including fees for commercial databases, tools, license, etc.). The Final Amount depends only on the amount of information found, time devoted to the order, and the complexity of the order. However, always before starting work, we inform the client about the final amount to be paid.

Do I have to pay anything up-front?

Yes - initial fee - which is €100 (the initial fee is fixed, regardless of the amount of information found. Including fees for commercial databases, tools, license, etc.)

What if you don't find any information?

If no information is found in a given case, then the customer will not be charged (only initial payment - €100). The fee is charged only when at least one piece of information is found and then it is the sum of the initial fee and the appropriate amount determined before the start of the order.

Examples of types of information we can find.

Addresses of residence, business, telephone numbers and communication identifiers, close friends, contractors, relationships with other persons or entities, accounts on social networks, e-mail addresses, technical data of the systems used, geo-location determination, analysis of the technical infrastructure used, metadata files, e.g. when the photo was taken, where they were taken, etc.

External Vulnerability Assessment

What are the typical targets of your assessment service?

We are able to provide a vulnerability assessment of web applications, internet-connected servers, and internet-connected networks. Multiple targets can be included in one assessment, however, as the range of targets expands, the level of detail will be reduced in a fixed-price offering. If you need a large number of assessed endpoints online, custom options are available. In addition, we conducted a targeted WordPress security assessment and attack surface assessment using open source intelligence that can be performed without impacting the target network/systems.

Who uses these Security Assessment Services?

Our professional assessment services are popular with anyone wanting to have an independent external assessment of their security status. Customers are located all over the world and range from small businesses to large enterprises.

What are the testing methods used?

By using a combination of manual security tests and automated testing tools, the site, network, and/or system will be checked for security vulnerabilities. The results of the automated tools are assessed and verified using manual testing methods and other tools. An easy-to-follow safety report is then created that provides an overview of the findings in an understandable format.

Penetration testing or vulnerability testing?

Vulnerability Testing is an automated process, pre-programmed to find weaknesses and vulnerabilities. Penetration testing covers a much wider area and relies on the combination of automation techniques and specialist knowledge to recreate the methods used by hackers during an attack.

How much do security tests cost?

Costs depend on many components, such as the size of the network, which defines the length of the tests. Each project is individually priced.

Don't find the answer? Write Us

Are you looking for expert advice for your online investigation?

Copyright © www.onlineinvestigations.ie | 2021 | All rights reserved.
Created by: LoveArtDesign