Honeypots are computers intended to be exploited by attackers. This enables security personnel to gain valuable intelligence on a hacker’s tactics and techniques.
We help make the honey: that is, convincing, custom decoy files to populate those systems. These files can be customized with your organization’s letterhead, logo, and non-sensitive details. We can create a wide variety of decoy files, including any of the following:
- Strategy briefings and presentations
- Marketing plans
- Patent drawings
- Blueprints or schematics
- Email correspondence and chatlogs
In addition, KLS Cyber can create decoy databases containing fake usernames and passwords, payment information, and/or biographic data.