REGISTER

By submitting this form you agree to the Website Terms of Use, consent to be contacted by Viettel Cyber Security and its partners, and acknowledge the Privacy Notice.
Viettel Cyber Security is committed to protecting your personal information and respecting your rights. The information you provide will only be used to administer your account and provide you with requested product and service information. We would like to contact you in the future about our products and services and other information which we think may be of interest to you. If you consent to us contacting you for this purpose, please check the box below.
I consent to receiving other communications from Viettel Cyber Security

In the time when malicious actors operate in the shadows with cyberattacks becoming ever more sophisticated, are you confident that your company is truly secured ?

You might think so, but the reality is different

Register now for a free Cyber Health Check report for your company to evaluate the security posture in the digital landscape.
Register to receive a report free!
Cyber Health Check Report
  • Proactive Identification: Understand what risk companies are facing, including data breaches, compromised accounts, vulnerabilities can bring severe impacts to the system, etc
  • Impact assessment: Understand the severity and implications of threats, enabling better decision-making and resource allocation to mitigate risks effectively.
  • Recommendations: Ensures that the organization is not only aware of potential threats but also equipped with actionable steps to address them.
A tailored private report for your company
  • Fraudulent domains
  • Fake social fanpages
  • APT attack
  • Malware
  • Data breach & compromised credentials

REGISTER NOW

150.000
FREE
Yen
*Information will be adjusted based on actual threats. Some items in the list might not appear in the official report
* Limited offer for customers who register from August 25th to September 25th, 2024.

Why should you get the Cyber Health Check Report?

As in February, 2024, in Japan, an organization faces an average of 1003 attacks per week, with FakeUpdates being the top malware. In recent times, major Japanese incidents include a sophisticated malware by a nation state, attacks on Nissan and JAXA, and data breaches at the University of Tokyo and CASIO.
Serious threats are hidden, and can come at any time. It's crucial to recognize these threats and take decisive action. How secure you are?
Get our free report to know what threats your company is facing!

Fraudulent domains report

Fraudulent domains are:
• Websites have domains closely resembling the official domains of yours
• Websites use brand images, mimicking your company's online services

Up to 15 fraudulent domains will be extracted, included names, domains and the severity

SAMPLE REPORT

Demo fraudulent domains 

Compromise accounts report

A compromised account is an account that has been accessed or controlled by an unauthorized party, often due to stolen credentials or exploiting security vulnerabilities. This can lead to unauthorized actions, such as data theft, fraudulent transactions, or further breaches within the organization.

You will receive the number of compromised accounts, including:
✓ Account Name/ Email address
✓ Plain-text Password (Only 1 account will include full password, others will included partly sensored passwords)
✓ Source
✓ Link
✓ Alert time
Up to 15 accounts will be extracted

Data breach report

This include source, link to the post where a threat actor claims to selling database of customers, number or leaked records and data fields

The process

REGISTER

Complete the registration form to express your interest in the 1-1 Threat Intelligence Report.
Register
Step 01
Sign an NDA to ensure all information remains confidential.
Sign NDA
Step 03
We will send you an email to confirm receipt of your registration, with information needed.
Confirm
Step 02
After 10 days, you will receive the 1-1 Threat Intelligence Report from Viettel Cyber Security.
Receive Report
Step 04
Develop and Implement a Plan
Create a remediation plan, apply necessary patches, strengthen access controls, and improve network security.

02

01

Review and Prioritize
Analyze the report, prioritize risks based on severity, and identify critical vulnerabilities.

REGISTER

What can you do after receiving the healthcheck report

Monitor and Improve
Establish continuous monitoring, schedule regular audits, and consider consulting cybersecurity experts.

01

Update Policies and Train Staff
Revise security policies, enhance incident response plans, and conduct cybersecurity training for employees.

01

Communicate
Brief leadership on findings and actions, and reassure stakeholders of the steps taken to enhance security.
We will reply you as soon as possible

Thank you for contacting us

SPEAK TO A PENTEST EXPERT

LET'S GET IN TOUCH!
To know if your data and digital asset are truly secure

Registration Completed

Thank you for completing the form. Click the button to download the casestudy

DOWNLOAD

Registration Completed

Thank you for completing the form. Click the button to download the guideline

DOWNLOAD