Honeypot Decoy Files

Honeypots are computers intended to be exploited by attackers. This enables security personnel to gain valuable intelligence on a hacker’s tactics and techniques.

We help make the honey: that is, convincing, custom decoy files to populate those systems. These files can be customized with your organization’s letterhead, logo, and non-sensitive details. We can create a wide variety of decoy files, including any of the following:

  • Strategy briefings and presentations
  • Marketing plans
  • Patent drawings
  • Blueprints or schematics
  • Email correspondence and chatlogs

In addition, KLS Cyber can create decoy databases containing fake usernames and passwords, payment information, and/or biographic data.