The Cyber Protection Group was founded by Michael Miller.
Read More »
Michael and his team have been in the Information Security industry for over 13 years. CPG was founded because of Michael's passion of information technology. Members of our team currently hold certifications by GIAC/GSEC, Microsoft, and hold a Secret Clearance. Our team members are always training in the following:
SANS Security Essentals
SANS Network Penetration and Ethical Hacking
SANS Web Application Testing and Ethical Hacking
InfoSec Institutes CISSP Program
Cyber Protection Group conducts network penetration tests based on the following standards:
Our experts contain GIAC certifications and regularly attend SANS training to keep up with the latest threats and vulnerabilities that exist today.
CPG can do two types of tests.
External Network Penetration Test:
During this test, we will see what vulnerabilities exist on your network from "outsiders". These vulnerabilities can be found over the internet. Hackers on the other side of the world would be able to see these vulnerabilities and could possibly exploit them. Our External Penetration Testing will discover the vulnerabilities that exist on your network and our team will advise on how to fix them. Did you know that just by having a website that is hosted at your company can allow an attacker to infiltrate your network and steal data or bring down your servers?
Internal Network Penetration Test:
The Internal Penetration Test is most commonly overlooked by most companies. Most only worry about what "outsiders" can do. If your network is not secure from the inside a simple laptop with malware could bring your network to its knees. What about partners, contractors, or guests that are using your wireless or plugging into your network? CPG will report the vulnerabilites from the inside of your network and advise how to remedy them
Cyber Protection Group uses the OWASP guidelines for application testing. This would include testing for the...
Read More »
2005 - 2010
Supported Information Security team with asset deployments, upgrades, and maintenance; including servers, databases, network assets, and web applications. Setup and monitored IDS systems including...