No Social Media

We take the information security CIA (confidentiality, integrity and availability) triad seriously.

Why No Social Media?

We take the information security CIA (confidentiality, integrity and availability) triad seriously. While most companies focus their energy on addressing various components of the CIA triad, most leave the confidentiality part vulnerable to social engineering, and phishing attacks.

Many companies will freely post client information, on their website (such as logos, testimonials with full name), or through social media, including allowing their team members to publish confidential client info within their LinkedIn profiles.

The good folks at MITRE, have published several articles through their ATT&CK knowledge base specifically addressing the social media, and own company website information as techniques that many adversaries take during the reconnaissance/initial phase of the attack chain.

At Prodigy13 we have a strict internal policy which prohibits our key team members from disclosing:

In addition, we do not publish full client names, and logos, or client contact information on our website, or throughout any other communication and marketing channels.

 

Our policy is enforced through our employment contracts, and also part of our standard master service agreement (MSA).

Why do organizations choose Prodigy13?

Holistic approach

Holistic approach based on the Zero Trust Security model, ensuring 100% coverage with Zero (0) blind spots

Affordable fees

Affordable fees, costing fraction of the cost for a typical Senior Security Engineer or other MSSP (Managed Security Service Providers) with strict deliverables and SLAs.

Highest security standards

Services, and team members adhering to the highest security frameworks, benchmarks and standards (NIST 800-53, FedRamp, CIS, MITRE ATT&CK)

Private Security

Private Security, ensuring full confidentiality of clients, and key team members (No social media policy enforced for team members)

Dedicated resources

Dedicated resource for each account, security analyst/engineer and account manager

Constant Communication

Communication via Zoom, private Slack channel, phone or email

Partnership & Certifications

All team members holding various prestige security certifications, and formal trainings including:

Certification Standards

Partner Companies

Security Organizations

Free Assessment

Frequently Asked Questions

Build and run applications knowing they are protected. Take an adversary-focused approach that provides automated discovery, continuous runtime protection, EDR for cloud workloads and containers, and managed threat hunting, enabling you to securely deploy applications in the cloud with greater speed and efficiency.

Build and run applications knowing they are protected. Take an adversary-focused approach that provides automated discovery, continuous runtime protection, EDR for cloud workloads and containers, and managed threat hunting, enabling you to securely deploy applications in the cloud with greater speed and efficiency.

Build and run applications knowing they are protected. Take an adversary-focused approach that provides automated discovery, continuous runtime protection, EDR for cloud workloads and containers, and managed threat hunting, enabling you to securely deploy applications in the cloud with greater speed and efficiency.

Build and run applications knowing they are protected. Take an adversary-focused approach that provides automated discovery, continuous runtime protection, EDR for cloud workloads and containers, and managed threat hunting, enabling you to securely deploy applications in the cloud with greater speed and efficiency.

Resources

Security

SAML explained

SAML explained in plain English: https://www.onelogin.com/learn/saml SAML is an acronym used to describe the Security Assertion Markup Language (SAML). Its primary role in online security is

Read More
Security

Threat Hunting – Practical Guide

Resource: https://www.threathunting.net/files/hunt-evil-practical-guide-threat-hunting.pdf To begin, let’s clarify what threat hunting is: Threat hunting is the human-driven, proactive and iterative search through networks, endpoints, or datasets in

Read More