Chat with us, powered by LiveChat

Cyber​​ Security

IN Services

Are you or your company vulnerable to cyberattacks? Is your phone or computer hacked or may be prone to eavesdropping? Our security department helps you with your cybersecurity so you can avoid your mobile being hacked or eavesdropped or that someone gets into your computer or your network. We prevent all forms of IT attacks.


When talking about cybersecurity, before you talked exclusively about cybersecurity regarding computers, servers, and clouds. Today, is also about your mobile phone, the surveillance cameras you have installed at home or at work and other IoT (Internet of Things). There are widespread vulnerabilities in most systems and protocols that hackers can use as a bridge to access vital systems or networks.


One of our special areas in cybersecurity is the security for mobile phones and mobile networks. Here we investigate, among other things if your mobile phone is at risk through your own network, or if a virus has been installed locally on your mobile phone. We help you identify or track infringements on your mobile phone and find evidence of such infringement.


Phone tapping occurs on an increased scale today. Telephone tapping can be initiated and implemented not only by authorities but also by private people who, for example, are focused on corporate espionage or individuals who may possess important information. Mobile phones sold in stores usually have very low security and use standard software and protocols. Today there are many known security holes for eavesdropping on a mobile phone, the most common is to build a so-called bridge between the mast and the mobile phone that you intend to hack or listen to. We help you modify your equipment to ensure that your mobile phone communicates with the right mast and we prevent telephone interception on a number of other ways as well.


Phishing is a very common method today to attack and infect work computers with malicious code. Phishing often starts with an email that appears to come from a bank or credit card company. In the email, the recipient of the email is asked to log in to a fake webpage with a login form.
This is an attempt to get your credit card numbers, bank information or passwords. The fraudster who comes across these passwords can then log into the computer and install malicious codes or software.
There is also a variant of hacking where the attacker hijacks a computer by exploiting yet unpatched security deficiencies in, for example, the browser, this becomes possible if the user clicks on links in the Phishing email.
We offer Phishing Tests to strengthen the resistance to these types of attacks. The test means that, under controlled conditions, we design and execute one or more tailor-made phishing campaigns. These are aimed at a list of recipients, either established by the customer or by Sentor through Threat Intelligence and via mapping of the customer’s organization through publicly available sources.


Creating a well-functioning IT structure can be tedious and demanding, and there are a lot of circumstances to consider to do it correctly. We help you to inspect and test your network to check if it’s configured correctly and if it can withstand the most common and well-known types of attacks. We also help you set up a safety net and a custom monitoring software.


The internet has in many ways changed our everyday lives and our way of sharing news and information. The internet has also affected our way of socializing and how we listen to music and look at moving pictures. The web is full of useful information available to anyone with a computer, smartphone or other devices with an internet connection.
At the same time, the Internet has become an arena for criminal acts and as technology evolves, it becomes increasingly important to know how to protect yourself against hacking, Internet bluffs, illegal virtual intrusions, identity theft and much more that is found in the criminal repertoire. Individuals, companies, and authorities often turn to us for help with existing problems, but also to learn about preventative work and how to best protect themselves or their company.


There is a common misconception that a complicated and seemingly secure password is sufficient enough to protect the information you send, receive or store on the Internet and that only the account owner himself has access to what is behind the login to the email, social media or other platforms. A well-chosen password is, of course, important, but it does not guarantee complete protection. There is always a risk of data breaches, both with computers and mobile devices. This does, of course, pose a great security risk for both individuals and for a company that holds important sensitive information.

It is today possible for hackers to get into electronic devices, many times this can happen without the user even noticed it and once they realized it has happened it is often too late. It might seem that new mobile phones are safer and better protected, but when the technology manufacturers work out new security solutions, the hacker works just as hard to get past the new obstacles that are being set up. There is no guarantee that this won’t affect you. It has, for example, become more and more common for hackers to target an individual employee by corrupting their mobile phone, in order to be able to spread viruses to computers or other electronic equipment in the workplace.


  • Suspect that your computer, phone or tablet has been hacked.
  • Has suffered, or suspected, a data breach by a company or authority.
  • Feel like your device might be wired and think someone might be using your electronic devices to monitor and spy on you.
  • Seeing evidence that someone else has access to your private files and storage media, for example, that data is being deleted or changed without any visible explanation.
  • Receives anonymous messages or threats online, where the sender seems to know personal details and information about you.
  • Is a public person with an increased risk of hacking and data breach attempts.
  • Not sure how much personal information is available online about them.


The people who enter other people’s computers and networks in search of information have a large arsenal of techniques and methods for their help. It is often difficult to effectively protect yourself against data introduction if you are not aware of the risks and know how to go about it. We work with cybersecurity on a daily basis and implement unique solutions for individuals, companies, and authorities to improve their security when using IT and the Internet.

We perform exhaustive penetration tests of electronic equipment and devices to see if there are vulnerabilities and weaknesses that a hacker could exploit. If we find vulnerabilities and security gaps, we will develop a solution that a company or agency can use to prevent data breaches.

The biggest mistake you can make is to think that you are safe or that the company you run would not be of interest to anyone, but this is not correct. Regardless of the size of the company, there is always sensitive information that someone could benefit from.


In situations where an intrusion has already taken place, we then do a damage check to evaluate and estimate the damage and see what type of information has been compromised. This is service is mainly for companies and authorities where we first stop the intrusion and then conduct a thorough investigation.

There can also be an investigation done to see if a mobile, computer or tablet has been hacked or if it has been hacked before. This can be done either by sending the unit to us or by doing the investigation on site.

Data breaches are becoming more and more common, and individuals, businesses and authorities must be one step ahead of those who might want to access your sensitive information.


Contact us for more information. We offer a free consultation to see what solutions are available for your particular situation.

Related links

Protection against espionage


A company's website was hacked and there was a suspicion that important customer information such as bank numbers and addresses could have leaked. This would, of course, damage the company's reputation, but also expose customers to risks. The company contacted us for help and our IT technicians quickly made a complete investigation where the hacker was stopped. We also looked at which parts of the system the hacker had accessed and could see that only a few customers' information might have ended up in the perpetrator's hands. Thanks to this, the vulnerable customers were informed and a follow-up was made at the company to find other so-called "weak spots" in their software and hardware, in order to prevent future hacking.

Discover more