thank you for coming!

Trying to make the digital world safer, one test at a time.

image

My last publications

Explore my blog to found interesting pentesting process and investigations.

Shape1

My last publications

Explore my blog to found interesting pentesting process and investigations.

My last publications

Enchance Your Cyber Defenses

Username / Password

 

  • Use strong passwords
  • Avoid use the same password in differet places
  • use credentials manager
  • Regulary change your passwords

Ensure that your credentials or sites where your are using it are secure.

expert-image

Suspicius emails?

this last year the pshishing campaings increase a lot, pay attention to this:.

  • Dont open links from untrusted sources
  • Dont kwon the sender? dont trust
  • Be Proactive, report suspicous emails to help others
  • becareful with attached files

Lorem ipsum dolor sit amet consecte adipi scing elit adipiscing eleifend dictum poteder mattis viverra lorem ipsum dolor sit amet consecte adipisci ng elit adipiscingdiper eleifend dictum potenti mattis viverra.

expert-image

Somebody is watching you

Somethimes people sufer privacy related diclosure thouth his screen when somebody is looking what you have on the phone screen.

  • Use a position that block the view of the screen.
  • avoid to open sensitive content when youre in public.
  • Buy a privacy screen proetctor
  • Avoid to install aplications from untrusted sources

Lorem ipsum dolor sit amet consecte adipi scing elit adipiscing eleifend dictum poteder mattis viverra lorem ipsum dolor sit amet consecte adipisci ng elit adipiscingdiper eleifend dictum potenti mattis viverra.

expert-image

No all wifi are good

Many hackers use false free WIFI to catch devices in his controlled networks to steal data or compromise crednetials.

  • Avoid to use public WIFI if not necesary
  • Avoid networks that ask for credentials in a portal
  • Avoid the use of sensitive app in public WIFI such as bank
  • be proactive, after the use in a public wifi disconnect from the network

expert-image

Can a thirtparty access

  • is the pin pas of the door secure?
  • is ok if i leave this windows open?
  • is normal to leave my access card alone?
  • is necessary to protect that ethernet port?

the physical controls are very importante too!! default password to a restric area, people leaving his access card alone, and more allow attackers to clone cards or access to restricted areas.

expert-image
Shape

We Try To Keep People Safe & Secure Around The digital World

00+ Reports

Delivered to differetent companies

Left image
Middle image

00Vulnerabilities

Reported across different companies

Right image
Shape1
Shape2
Shape3
Cyber
cristopher.provoste.a@gmail.com

How testto Build a

Sed ut perspiciatis unde omnis iste natus error sit voluptatem accusantium doloremque laudantium, totam rem aperiam, eaque ipsa quae ab illo inventore veritatis et quasi

Read More »