Select Language : English


Brazil: English / 日本語 / Português do Brasil
United States: English

Europe, Middle East, Africa (EMEA)

(Belgium, France, Germany, Netherlands, Spain, United Arab Emirates, United Kingdom)
English / 日本語 / Español / Deutsch / Français
Russia: English / 日本語 / русский

Asia Pacific

Japan(Business): English / 日本語
Japan(Residential): English / 日本語
Australia(NTT Com ICT Solutions): English
Mainland China: English / 日本語 / 簡體中文
Hong Kong & Macao: English / 日本語 / 繁体中文 / 簡體中文
India: English / 日本語
Indonesia: English
Korea: English / 日本語 / 한국어
Malaysia: English
Philippines(DTSI): English
Singapore: English / 日本語
Taiwan: English / 日本語 / 繁体中文
Thailand: English / 日本語
Vietnam: English / 日本語

Get your security checked to gauge overall security posture.

[ Sep 20, 2018 ]

Still, in this day, Security in IT is talked mostly about preventing a system from cyber-attacks or keeping your PC safe from black hat hackers working suspiciously in a dark basement of abandon buildings, this is not the only case. IT Security starts from non-IT activity and interface. An attacker can obtain vital information about your company or your credentials without touching a keyboard, like just talking to you.

Securing your company does not necessary means you must invest much money in latest security hardware or software, without proper handling manner or knowledge those devices may not perform as it should. Anybody can leave a security hole behind when he or she are working long overtimes or under immense pressure. Even bad habits of cutting corner may result in an entry point for an attacker.

Having a standard procedure and compiling to it may help to enforce security of your company. Having stringent approval procedure can prevent mistakes. However, are all conducts in place in the company all appropriate? What if there are a defect or even holes in security measures?

Here we will like to discuss what kind of security prevention programs out there for companies to understand their current security status. It is not limited to the realm of IT, and they are meant to emulate real-life attacks exposing any possible vulnerabilities a company might have.

Security Assessment:

Evaluate the current state security practices of organization, in comparison to the requirements as dictated by Cybersecurity Maturity Assessment and Security Architecture Assessment. Coherently associate and map the existing Assessment Result to the set of information security policies, procedures, guidelines, technical artifacts, and implementation practices. Also, determine the gaps associated with security control requirements and gauge the overall security posture.

Vulnerability Assessment:

This attempt to identify all potential vulnerabilities across an application or Network segment. Both automated and manual test will be conducted to identify known flaws and weakness. This assessment is best suited for the organization who require assistance in identifying the gap between their technologies and process.

Penetration Tests (Pen Tests):

In a penetration test, simulated adversary attacks asset where exploitation against vulnerabilities are identified and determine the potential damage that could be done. This test shows how secure is the assets are and show what kind of potential damage can cause by attacks.

Social Engineering:

Attacks are not conducted only on IT devices, but against human resource too. Social Engineering attacks the organization’s employees and manipulates them to run a file with simulated malware, click on malicious links or give away their credentials. Social engineering test is for companies and organizations to evaluate the effectiveness of the security measures in place and awareness level of employees.

Red Team Exercise:

This exercise is a realistic attack simulation targeting the organization. The objective is to gauge and measure the awareness and responsibility of the target organization. This simulation is done without prior notice to IT and security division of the targeting organization. Red team exercise is ideal for the organization that wants to assess the internal awareness and ability to respond to an advance attacker and threats.

NTT Communications offers a range of security assessment services that help the organization identifies hidden vulnerabilities.

Tips: Thailand

Thanawat Wiwatpanit, Deputy Director of Product & Service Department

Thailand is now shifting to high value-added manufacturing and growing of the service industry therefore many organizations recognize the importance of FinTech. Trend comes with increasing in targeted of Cyber-Attacks which occurring everyday. We think that organizations should be ready for Risk Management and improvement of Cyber Security.

Related Services


Our WideAngle global integrated security service is built on 25 years experience providing risk management services to over 8,000 customers, worldwide. We offer a combination of professional services, security solutions and managed security, powered by a security information and event management (SIEM) engine.

Total Security Package

NTT Com (Thailand) offers various kinds of security improvement services based on a three-step solution.

  • Security Inspection
  • Security Expert
  • Security Supervisor

Virus Scan Services

NTT Com (Thailand) provides system integration of virus scan solutions and virus scan management service to protect your PC network environment from computer virus.

Related Articles

ICT security trend. looking back on 2017, new attacks, new threats and what have not changed.

Designing Security Measures for a New Era, From Scratch

Back to Top