Our services

Featured services that we offer.

Penetration tests

Our experts will asses your applications, networks, or websites. The tests are driven by the OWASP, PTES, or OSSTMM methodologies.
More...

NIS2 GAP analyses

We'll evaluate your current security posture with regard to the current draft of the Czech Cybersecurity Act (Zákon o kybernetické bezpečnosti).
More...

Phishing

We provide phishing-as-a-service (PhaaS). Following the initial assessment, we'll provide training for your employees and regular re-tests.
More...

Our team

This is our team. We have many years of experience working with the largest European customers.

Miroslav Beneš

Miroslav Beneš

Marek Sušický

Marek Sušický

Lukáš Dolanský

Lukáš Dolanský

Adam Škoda

Adam Škoda

Jitka Marešová

Jitka Marešová

Tomáš Hulín

Tomáš Hulín

Featured projects

What past projects have we completed, why and what were the results?

Frequently asked questions

Answers to some of the frequently asked questions.

Image
  • We haven't had any problems so far, why should we invest in security?

    Nowadays, it's not a question of if, but when you'll fall victim to a cyberattack. The attack may come in the form of a simple phishing attack, or an attempt to infiltrate ransomware into your internal network and the subsequent theft or encryption of your data. Having an effective backup solution deployed and frequent employee training is key to avoiding disruption and disaster.

  • How do the consultations go?

    Together, we'll dart though a questionnaire that addresses the most important areas relevant to security. Based on the information you'll provide, we'll suggest sensible steps tailored to your business needs that will effectively reduce the risks to your firm.

  • Can we meet online?

    Yes, it's possible to meet online and consult remotely. This solution is often more efficient and friendlier to the environment.

  • What does Sec4good mean? What's that in your logo?

    Sec4good comes from "security for good." Our logo depicts a brave mongoose; in the wild they love to hunt for poisonous snakes.

Image

Why us?

The field of cybersecurity is rich in competition. Why should it be us that you choose?

  • Over the past 15 years, we've worked on projects for the largest corporations
  • We can develop a long-term security strategy
  • Security and legislation is our second language

Consultation packages

Choose from one of our introductory packages. Together, we'll evaluate your security posture and devise steps to improve it.

Small company

S

  • Up to 10 devices
  • 2-hour online consultation
  • Initial suggestions
Contact us

Medium company

M

  • Up to 50 devices
  • Half a day of consultations at your workplace
  • Basic scan
  • Security posture improvement plan
Contact us

Corporation

L

  • All the needed consultations at your workplace
  • Security posture improvement plan
  • Presentation and a discussion of results
Contact us

Our newest posts

Read our blog where we write about current trends in cybersecurity.