Do you know your weakest link?

Request your security assessment

Do you know your biggest cyber risk?

How vulnerable is your organization? Are your workplaces safe? Did criminals have access to your login details? How easy can a ransomware attack take place?

Skopos research indicated that for 59% of the employees information has been breached. Criminals use this data to launch cyber attacks. For example by sending targeted messages with attachments to launch a ransomware attack. Are you employees able to recognize these message? Is the laptop hardened to defend? The combination of breached data, low employee awareness and a unpatched laptop is a explosive cocktail.

You want clarity on the risk your employees, websites, machines and organization are exposed to.

Our certified cyber experts carry out a comprehensive cyber security audit in these areas. You can expect clarity and a solid report.

“The way the Skopos team showed us how they got get access to our data, was like a movie. Skopos found vulnerabilities we forgot about”

CISO H. K., Dutch Government body

Skopos security assessment

Security Assessment
Are you an interesting target for cyber criminals?

from €
ex. VAT
Suitable for most organisations from 50 - 1.000 employees that care about data and reputation.
Skopos will perform;
  • An extensive penetration test on your servers
  • Web application scanning on your websites
  • Assessment of data exposed to criminals on darkweb
  • Assess cyber awareness among your employees
  • Assess your risk of a ransomware attack on workstations
This will give you a clear overview of cyber risks. Skopos can benchmark the results.
For organisations with custom needs
Your organisation has different requirements, regulations or a large footprint you want to test.


What to expect?

The Skopos team performs a comprehensive analysis on your organization, with a focus on four themes:


We scan the website (s) for available services, open ports and software versions. This gives a good sense how attractive the website is for attackers.

Workstations & servers

With our software we perform a comprehensive analysis of workstations and servers. You will know exactly how vulnerable workstations and servers are. You will gain insight into the top risks. With this information you can see how likely a ransomware attack is and you know whether an attacker can easily take over a system. You get a list of all vulnerabilities; this covers for example software that has been hit by data leaks or applications that hackers prefer to take advantage of. Your IT partner can use this list to prioritize activities.


We will search the public- and dark web for information about your organization. We tell which employees have data exposed in a data breach. You will see exactly where, when and for whom which data has been leaked. If possible, we will show you the passwords (SHA1).


We measure the level of cyber awareness among your employees. Think: do you use strong passwords? Do employees understand the risks of attachments in emails?