Do You Know Your Attack Surface on the Web?

When it comes to exposure of your networks, computers and devices on the Internet, ignorance is not bliss. If it can be seen, you can be attacked. We can help you to see and neutralize your vulnerabilities.

network nodes

Cameras

  • 13% of Home Security Cameras Have Been Hacked

    13% of home security users have experienced their security cameras being hacked, emphasizing the importance of using cameras with end-to-end encryption, frequent firmware updates, and secure authentication methods to enhance security
    Read more
  • Security flaws in two major brands of Chinese-made surveillance cameras enables hackers to take control

    Security flaws involving the two top brands of Chinese-made surveillance cameras enables hackers to take control for both spying and further intrusion into networks
    Read more
  • Over 43% of security camera owners are worried they have been hacked

    A recent survey by U.S. News & World Report revealed a startling statistic: over 43% of security camera owners are worried that they have been hacked.
    Read more
  • Amazon Ring Fined $5.8M for allowing employees to spy

    Amazon.com’s doorbell camera unit Ring was fined $5.8 million for allowing its employees to spy on customers camera feeds.
    Read more

Data

  • Average Cost for Data Breach for SMB nearly $3M in 2022

    The average cost of a data breach for a small-to-midsized business can vary depending on the size of the business. For small businesses with fewer than 500 employees, the average cost was around $2.98 million in 2023.
    Read more
  • On average, only 3 percent of SME’s data folders are protected

    On average, only five percent of a company’s folders are protected for businesses overall, and this figure drops to 3% for small-to-midsized businesses
    Read more
  • 79% of organizations have lost data from a cloud service more than one time in the last 18 months

    In the last 18 months, 79% of companies have faced at least one cloud breach, with 43% reporting more than 10 breaches in that period
    Read more
  • Since 2020, healthcare breach costs have increased 53.3 percent to $10.93 million

    Since 2020, healthcare breach costs have increased 53.3 percent to $10.93 million
    Read more

Green Energy

  • 57% Attacked: Why Small Businesses Need to Rethink Cybersecurity

    An alarming 57% of Small and medium-sized enterprises (SMEs) have experienced a cyberattack, according to recent reports, highlighting that they face a disproportionate cybersecurity challenge.
    Read more
  • 73% Of Black Hat Hackers See Standard Firewalls and Antivirus programs as obsolete

    73% Of Black Hat Hackers See Standard Firewalls and Antivirus programs as obsolete
    Read more
  • The average ransom demand for an SMB was $1.62 million in the first half of 2023

    The average ransom demand for an SMB was $1.62 million in the first half of 2023, a 47% increase from the previous six months and a 74% increase over the past year,
    Read more
  • Catastrophic Risks To EV Charging Station Security

    As electric vehicle adoption surges, Experts are stressing the urgent concerns regarding the security and privacy of charging stations and the need to fortify charging infrastructure to protect customer data, ensure Wi-Fi network integrity, and prevent potential disruptions to power grids.
    Read more

Healthcare

  • 73% Of Black Hat Hackers See Standard Firewalls and Antivirus programs as obsolete

    73% Of Black Hat Hackers See Standard Firewalls and Antivirus programs as obsolete
    Read more
  • Rate of Attacks on Small Physician Groups and Hospitals Rose five fold in 2022

    The number of attacks on physician groups and small hospitals rose from 2% in the first half of 2021 to 12% in the same period of 2022. 
    Read more
  • 83% of 1,300 physician practices surveyed have already experienced a cyberattack

    83% of 1,300 physician practices surveyed have already experienced a cyberattack according to a recent survey by the American Medical Association
    Read more
  • 57% Attacked: Why Small Businesses Need to Rethink Cybersecurity

    An alarming 57% of Small and medium-sized enterprises (SMEs) have experienced a cyberattack, according to recent reports, highlighting that they face a disproportionate cybersecurity challenge.
    Read more

Manufacturing

  • 73% Of Black Hat Hackers See Standard Firewalls and Antivirus programs as obsolete

    73% Of Black Hat Hackers See Standard Firewalls and Antivirus programs as obsolete
    Read more
  • The average ransom demand for an SMB was $1.62 million in the first half of 2023

    The average ransom demand for an SMB was $1.62 million in the first half of 2023, a 47% increase from the previous six months and a 74% increase over the past year,
    Read more
  • Businesses with 10 to 49 employees saw a nearly fourfold rise in the average number of attacks in 2022

    Businesses with 10 to 49 employees saw a nearly fourfold rise in the average number of attacks in 2022 hackers have directed more of their attention to mid- and small-sized businesses according to Insurance provider Hiscox's 2022 Cyber Readiness Report
    Read more
  • 57% Attacked: Why Small Businesses Need to Rethink Cybersecurity

    An alarming 57% of Small and medium-sized enterprises (SMEs) have experienced a cyberattack, according to recent reports, highlighting that they face a disproportionate cybersecurity challenge.
    Read more

The Costs of Insecurity Are High and Growing

We need the Internet. But the Internet and telecommunications networks are insecure and NOT PRIVATE. Because of this:

  • Remote distributed workforce with BYODHas made traditional defences like VPNs irrelevant
  • Everything is Getting ConnectedIt is no longer just your data at risk
  • Al is expanding both the sophistication and breadth of attacksExponentially lowering the costs and increasing the power of decentralized attacks
  • SMBs Are in the Bullseye

    While attackers used to spend most of their energy on big Enterprise and government targets, that has all changed. Powered by ever more sophisticated tools and automation, criminals gangs, hostile state actors and other adversaries are coming after small-to-midsized businesses with the same ruthless efficiency.

    And its no longer just data they are after - Ransomware is even more lucrative when the threat is to shut down the production line of manufacturers, critical ehealthcare devices, charging stations and so on. If it is connected and can be seen, it can and will be attacked.

    Attack Surface & Threat Analysis Can Help

  • Faction Communications Corp. has partnered with the Mobile Intelligence Alliance, a US 501(c)(3) non-profit organization focused on reducing cyber threats to Internet users, to provide independent services on different levels of visibility into internet-exposed devices, including network details and metadata about the connected assets of an organization such as the OS and network services that are exposed and potentially vulnerable to attackers.

    Various types of sophisticated, industry leading scanning and analysis tools are used to obtain the information needed to assess the risks of exposed assets to external attacks. Deeper inspection can then reveal active communications and potential attempts of potentially malicious nodes targeting your network, who is attacking, and a profile of the attacking network.

  • Industry Exposure Report

    Get the latest summary and specific intelligence on Attack Surface Exposure for your industry vertical
    Learn More

    Threat and Vulnerability Assessment

    A detailed report of exactly what networks, devices and application can be seen - and attacked - for your organization
    Learn More

    Threat Analysis and Reconnaissance

    A deep investigation and analysis, including reconnaissance of potential active compromises and attacks
    Learn More
    SERVICEOUTPUTS PROVIDEDSERVICE DESCRIPTION
    INDUSTRY EXPOSURE REPORTA report showing the quantity of publicly exposed services used in different industry verticals, including industrial manufacturing, healthcare, and green energy.The Exposure Assessment provides intelligence into internet-connected services and devices used in different industries. It looks at service protocols and host information to show the attack surface routinely exploited by criminal hacker organizations and state-affiliated threat groups.Download Now
    THREAT AND VULNERABILITY ASSESSMENTA report showing exposed hosts and vulnerabilities of an organization's network, with an overview of threat risk. The assessment requires network details from the organization.The Vulnerability Assessment conducts a multi-faceted analysis of an organization's attack surface. It scans a range of IP networks and hosts provided by the organization and searches for known vulnerabilities. The scan results are provided in a report showing exposed and highly vulnerable assets.Apply Now
    THREAT ANALYSIS & RECONNAISSANCEA detailed report showing exposed hosts, with a detailed view of the external attack surface, including malicious breach attempts from known adversarial networks.The Threat Assessment conducts a deep investigation of an organization's attack surface to find exposed surface weaknesses and potential compromise. It uncovers malicious external networks which actively and periodically attempt to breach the organization's network defences, and the techniques and tactics used.Get a Quote

    Industry Exposure Report

    Understand Your Threat Environment and What You Should Be Looking At

    The Exposure Assessment provides intelligence into internet-connected services and devices used in different industries. It looks at service protocols and host information to show the attack surface routinely exploited by criminal hacker organizations and state-affiliated threat groups.
    While threats are pervasive, not all industries are equal in either their exposure or the severity of impact for cyberattacks. Manufacturing, Healthcare are two in particular - and of course Infrastructure, starting with Green Energy - that share characteristics which make organizations vulnerable to catastrophic damage from criminal and hostile state actors.
    • Smart, dumb and legacy devices which are mission critical to operations – or even the lives of customers, staff and end users. It’s not just your data that hackers are after any more.
    • The inability of VPNs and Firewalls – or even ZTNA – to truly protect these devices, as they have no CPUs or other resources.
    • The difficulty in getting end users and staff to adhere to rigorous cybersecurity best practices that are then required to try to keep them safe.
    A report showing the quantity of publicly exposed services used in different industry verticals, including industrial manufacturing, healthcare, and green energy.
    The Exposure Assessment provides intelligence into internet-connected services and devices used in different industries. It looks at service protocols and host information to show the attack surface routinely exploited by criminal hacker organizations and state-affiliated threat groups.
    Learn More

    Threat and Vulnerability Assessment

    Find Out Exactly What Devices, Networks and Data Are Visible and Vulnerable to Attack in Your Organization Right Now

    No matter how many layers of security, training, processes and monitoring you have in place, one fundamental truth remains: if it can be seen, it can be studied and attacked.    

    Faction Threat and Vulnerability Assessments provide a detailed report of exactly what can be seen on your networks and devices on the Internet. If they can be seen by us, they can be seen by anyone - most especially malicious adversaries armed with the same tools. It is only a matter of time - and how valuable the target - before you are compromised.

    The Faction team conducts a multi-faceted analysis of an organization's attack surface with sophisticated tools. It scans a range of IP networks and hosts provided by the organization and searches for known vulnerabilities. The scan results are provided in a report showing exposed and highly vulnerable assets.

    This then gives you the power to make informed and intelligent decisions about your true level of risk, and what to do about it. And of course, if you want to mitigate that risk, Faction can provide low-cost options and support your MSP to implement a strategy and plan to get all of your critical devices, computers and systems off of the Internet.

    Remote malicious actors - no matter how sophisticated - cannot attack what they cannot see or reach.

    Request an Assessment

    Register to request an assessment.
    There will be an initial screening and consultation with no cost or obligation.
    Request An Assessment Now
    A report showing exposed hosts and vulnerabilities of an organization's network, with an overview of threat risk. The assessment requires network details from the organization.
    The Vulnerability Assessment conducts a multi-faceted analysis of an organization's attack surface. It scans a range of IP networks and hosts provided by the organization and searches for known vulnerabilities. The scan results are provided in a report showing exposed and highly vulnerable assets.
    Learn More

    Threat Analysis and Reconnaissance

    Learn What Critical Networks and Devices Are Under Attack Right Now and the Location and Genesis of the Attackers

    If you find that your critical networks, devices and systems are vulnerable, the next question becomes: "How immediate is the threat?" In many cases, you may be under attack right now. Faction can give you this critical intelligence and analysis in order to take immediate effective steps to neutralize attacks and focus your investigation of what is compromised.

    The Faction Threat Analysis and Reconnaissance Team will conduct a deep inspection of an organization's attack surface to uncover potential surface weaknesses and compromises. It uncovers malicious external networks which actively and periodically attempt to breach the organization's network defenses, and the techniques and tactics used.
    Learn More

    Frequently asked questions

    • What are the typical targets of the assessment service?

      The assessment locates connected devices that host network services and run various applications accessible from the internet, such as:

      • Web hosts, including private web servers
      • Virtual hosts, such as virtual servers (both IP-based and name-based)
      • Cloud storage servers
      • Private VPN’s
      • Firewalls
      • Wireless Access Points
      • Internet connected devices, such as web security cameras, sensors, healthcare devices, manufacturing equipment, and other smart and dumb devices.

      You can specify individual IP addresses, network ranges, and include your domains for the assessment. However, for large and highly distributed deployments such as remote sensor or industrial processing networks, you should contact us to discuss customized options.

    • Who uses these Services?

      Organizations of all sizes in many industries are concerned with understanding and mitigating vulnerabilities to internet-based attacks. Not all organizations face the same threats, and the nature and targets of threats are constantly changing.  Our services are designed to address the needs of many industry verticals.

      Our Industry Exposure Reports are for organizations that want to get a current picture of the exposed hosts using applications and services in their industry vertical, and where they should focus their attention to formulate defences.  This report is available to any organization worldwide.

      Our Threat and Vulnerability Assessment services are popular with anyone who wants to understand the exposure and vulnerabilities in the security postureof their specific organization with regard to internet exposed networks, devices and data. Currently, these services are restricted to organizations in North America[GM1] , which can vary from small business to large enterprises.

      Our Threat Analysis and Reconnaissance services are for organizations that have reason to believe that they may be under current or imminent attack. Typically, this is due to a specific cause for concern, such as:

      • Warnings or alerts from the media, cybersecurity and/or law enforcement agencies relevant to your industry vertical or organization;
      • Poor network performance or unusual behavior from IT equipment and concerning computer activity observed by staff;
      • Amplified alerts from virus monitoring tools, increased volume of phishing emails, and application or computer lockups;
      • Concerns of active threats resulting from an initial Industry Exposure Report;
      • Discovery of specific vulnerabilities resulting from a Threat and Vulnerability Assessment.

       [GM1]Why is this restricted to organizations in North America?

    • Can I get an assessment against client systems?

      Of course! Agencies and consultants can use this service to perform security reviews of sites they are handing over or working on. A value added service for your web projects or managed services.

    • Why is there a minimum fee for a Threat and Vulnerability Assessment?

      We use various security tools to provide actionable information to our clients. Due to the highly sensitive nature of the reporting outputs, we use payment as part of the identification, verification, and screening process to prevent abuse. You must be the owner or operator of the system or have explicit authorization for us to conduct a vulnerability security assessment on behalf of your organization.

      Conducting a vulnerability assessment takes time and resources to address in a professional and thorough manner while providing rapid response. Please fill out our registration form to schedule a consultation to determine if your organization qualifies for any special programs.

    • Can our integrations with 3rd party vendor equipment be included?

      Yes, if you have systems installed or integrated with 3rd party vendors, let us know and we can include them in our scans and analysis.

    • What does the Threat and Vulnerability Assessment Include?

      1. We provide an inventory report of exposed host IP addresses, open services on those hosts, assets at a particularly high risk of adversary exploitation, and potential vulnerabilities of those hosts in the context of an organization’s network security posture.
      2. Recommendations on steps for mitigation or remediation, if further investigation is warranted, and key focal points.
    • What does the Threat Analysis and Reconnaissance package include?

      1. Report. We compile a report after conducting an analysis of the results from the active and passive security tools. Sections include an overall summary of the results, including vulnerabilities found, a list of discovered vulnerabilities with recommended remediation steps, and an inventory of exposed assets in an appendix that contains the raw results and screenshots from the tools that used during the assessment.
      2. Presentation & Consultation. We conclude with a 1 hour working consultation to walk through the results, answer any questions, and ensure that you have actionable findings.
      3. Next Steps and Follow Ups. If necessary, we can schedule additional periodic analysis and reconnaissance of your network or refer you to managed security or forensic professionals based on the results. (These are optional and would depend on your choice of follow-on actions and expertise required to address any identified attacks or compromise).
    • What % of these fees does Faction Communications get?

      The Mobile Intelligence Alliance, a non-profit 503(c)3 corporation, provides all of the professional services and analysis and keeps 75% of the fees. Faction Communication Corp. keeps 25% of the fees to cover the following:

      1. e-commerce and other processing costs;
      2. scheduling and management of customer engagements;
      3. proprietary tools, databases and expertise that we provide in delivery of these services.

      Our partnership with Mobile Intelligence Alliance is based on our shared goal to help average users and small to mid-sized businesses to increase their understanding and awareness of the many threats to their security and privacy, and enable them to do something about it.

      Faction Communications is open to and engaged in discussion with other partners in this area. Professional services is not a long term component of our business model, which is focused on our SaaS platform, applications and solutions.

    • Will Faction partner with other organizations for attack surface assessments and threat analysis?

      Certainly! However, this area has many different tools, consultants and contractors, which makes it very challenging and complex for the average small to mid-sized business user to sort out the wheat from the chaff.

      Or in some cases, it can be far worse. When it comes to VPNs – and cybersecurity tools – there are actually very large numbers of apps which are malware created by both criminal gangs and hostile state actors.

      Therefore, Faction will go through a careful vetting process of any organizations that we recommend and/or partner with, and certainly expects the same in return! There is nothing more important to us then the security and privacy of our customers and users.