top of page

Stolen Laptop

With large numbers of staff remote and hybrid working, the risks around mobiles devices

has increased drastically.

Stole Laptop Assessment

Test the part of your network with the weakest physical security

During out Stolen Laptop Assessment methodology we consider scenarios in which laptops have been lost or stolen and an attacker gains physical access to the device. We use a combination of hardware attacks to try and bypass laptop security and assess what access we gain obtain from the laptop, bypassing login passwords and hard drive encryption.

Despite the use of hard drive encryption, in most cases we are able to gain full access to the laptop, extract Active Directory passwords, and in some cases access to the internal network using poorly configured remote access VPNs.

After demonstrating any weaknesses, we will provide guidance on how your laptops can be secured.

bottom of page