What is RealSec.io?
Can I hire you to hack someone?

No, you can't.
We do not carry out or promote any type of illegal activity that could harm individuals or organizations of any kind. The services we offer that involve ethical hacking are duly agreed upon, carefully planned, have the full consent of the applicant, and are strictly controlled so as not to cause any real damage.

I need to request more than one service.
Why don't you specify the prices for your services?
I have a need that's outside RealSec.io service catalog.

We would be happy to explore your specific needs and requirements and, if it is within our possibilities, we can propose a tailor-made solution. To do so, please go to our Contact page , and from the Services list on the form, choose the last option that says "Other". Additionally, we would appreciate if you could include a description of your specific need in the optional "Message" box. Once you submit the request, we will contact you shortly to determine the next steps.

Can you garantee me that I will never get hacked if I hire you?

No, we can't. In fact, no one can.
Cybersecurity (and naturally, cyber-insecurity too) is a constantly evolving landscape: new vulnerabilities, new malware, new threat actors, etc., appear every day. This is why all companies are constantly being attacked (and in so many cases, breached). Cybersecurity is not about completly eliminating vulnerabilities, but about reducing them to the minimum possible.

Why would I hire you instead of any other company?

Excelent question.

Cybersecurity is wrongly seen as a sophisticated solution that should only be implemented by a few organizations that can afford it. Something reserved, exquisite; an invisible and imaginary solution, that only solves invisible and imaginary problems. For this reason, most cybersecurity companies offer quite expensive and generic solutions, and only to a select list of clients.

This historical interpretation has meant that the industry does not naturally and horizontally adopt Cybersecurity, as other branches of digitalization have (we would only need to compare it to the current AI boom, or Blockchain before that, to give a couple examples). The indirect consequences of this, however, are very visible: countless attacks on organizations, infrastructure, applications, and many people who lose a lot of money, and the thing is that the victims are from all social strata, so these losses can (and very often are) catastrophic for many.

We want to change that. We see ourselves as an organization that tries to create a reasonably viable business model, but offer our quality services in the most affordable way possible. No inflated solutions, no imaginary deliverables, no "billable hours." We simply offer and perform the services we believe are the most responsible we can offer. We make excellent quality solutions at an affordable price.

Do you charge me based on worked hours?

Not really. We believe that the typical Consulting Firm approach where we'd abstract services as "hours to charge" is not for us.

Although it is true that we estimate the time it would take us to do a service in order to propose a deadline, we sell the service, not the time it will take us to do it. This allows us to work in an integral and complete way, and we avoid complacency in our work. This also allows us to differentiate ourselves from the vast majority of companies that offer cybersecurity services.

Does this mean that, either you will charge me more, or it will take you longer to do the job?

Neither. Our costs are actually lower than the market average. And the quality of our results is superior to our competition.
Does this make us less profitable than other companies? Maybe. But while we plan this to be a successful business model, our mission as an organization, and our founding values ​​are worth more than some extra money. You can check them out on our About us page.

What are the "optional" deliverables in your services?

Deliverables marked as "optional" are those that are not contemplated by default in the contracted service, and that can be added for a small additional cost.

Cybersecurity is just about having strong passwords, so why give it so much importance?

It would be great if cybersecurity was just about creating strong passwords, not using public Wi-Fi, and having an antivirus. However, this is not the case.

Cybersecurity is generally about being able to identify the risks that can affect me as an individual, my environment (physical and digital), and my business; identifying my critical flows, assets, and processes, the technologies and policies associated with them, and actions that a criminal could put into practice to attack them.

At RealSec.io we are experts at doing this, and what we get as a result is a list of all the vulnerabilities that a cybercriminal could exploit. Sometimes, these vulnerabilities can number in the hundreds for a single application or instance. What is our job? To find them, expose them to you, and help you mitigate them, before a cybercriminal exploits them.

Can you help us with an Incident Response requirenment?

We have some solutions related to Incident Response.
Under our Cybersecurity Consulting services we have a solution to help you build from scratch an entire Incident Response Plan specific for your organization, and under our Security Awareness & Training services we have the offering for a called "How to Respond to a Cybersecurity Incident" to help your team to be prepared to prevent and react to a cybersecurity incident.

However, if your organization is experiencing an unfortunate cybersecurity incident or cyberattack of some kind, and you need help to contain and mitigate this adverse event, at the moment we do not have a solutions offering to solve this type of critical scenarios.

If I request a service, what are the next steps?

This would strictly depend on the service in question, and the specific needs of the client, however, we normally follow the next general action items:

Initial Meeting Request
Once we receive the Service Request, our analysts receive the request, and respond to it by inviting you to a 1st-contact virtual meeting to get to know you, and understand your specific requirements for the service.


Understanding your requirenments to craft a Work Plan proposal
In the meeting, we share with you our understanding of the requested service. We ask any number of questions necessary to fully understand your requirements, and we agree to work on a Work Plan proposal, which will be the schedule, actions, and deliverables that will be proposed to resolve the requested service. We will present this Work Plan to you in a second virtual session, between 1 and 3 days after the Initial Meeting (depending on the extent of the requested service).


Second Meeting Request: Presenting the proposed Work Plan
We present you the proposed Work Plan, with which we will address the service you requested. In this meeting, we explain everything: the dates on which we would work, who would participate, the specific tests that would be executed, how the documents and deliverables that we would give you at the end would look, and the cost that the service would have if confirmed. Up to this point, all the work that the proposed Work Plan would take would be on our account, without commitments!


Service Work Plan Confirmation
Once you have studied the document with our proposal for the Work Plan, the ball is in your court, and we would await any reaction, doubt, or confirmation of the service. In case you confirm the service, we would begin to work according to the proposed Work Plan, and we would notify you at each step we take to give you the greatest visibility.

I want to see what the reports and results would look like if I hired a service.

Yes, no problem! If you would like to see a sample of the results we would deliver in a service, please contact us and we would be happy to schedule a virtual presentation of the specific service and the deliverables we would provide.

How much will it take you to reach back to me once I contact you?

After you've reached out from our Contact page, you'll hear from us in no more than 24 hrs.
If you don't, please send us another email and tell us about the delay. and you'll get a 50% discount on the next requested service. You'll also get an apology.

I'm not 100% sure that you'll give me the service that I need.

No problem. In fact, it's a good thing you think so, as it shows that you take your organization's cybersecurity seriously.
We take cybersecurity seriously too, and that's why we don't offer hermetic services, or canned solutions; we can tailor our services to any specific need or requirement. If something doesn't quite make sense to you, we'd like to invite you to contact us . We'd love to work with you and find a way to tailor our services to meet your needs.

I need to cancel a requested service.

We are sorry to hear that, although we understand that such situations can happen. Please send us an email at contact@realsec.io, mentioning that you wish to cancel the service, and include the Service ID that was provided to you when you made the request for the service.

If the service had only been estimated, or only a work plan had been drawn up but the service itself had not been started, cancellation of the service will be completely free if it is the first time a service is cancelled.

If the service has already started, only the proportional amount of the total cost of the service will be charged based on the completion progress of the service, according to the work schedule established in the Service Agreement that we provided to you before start.

Aren't "Penetration Testing" and "Application Security Testing" services the same?

The two service categories might sound similar, but they’re not quite the same.
Penetration Testing is a tactical assessment where we simulate real-world attacks to find weaknesses in your systems or networks, giving you a snapshot of your current security posture. On the other hand, Application Security is a strategic approach focused on securing your software. It involves evaluating and implementing security controls, performing code reviews, and guiding your team in adopting secure coding practices.

If you have any specific questions, please reach out to us, and we'll make sure to respond to all of them in full detail.

Can I hire you to develop software?

Not really, as we are not a software development agency, but we do have some development-related services.
Our Secure Software Development services are intended to integrate cybersecurity actions into our clients' software development processes, according to different frameworks and methodologies. In addition to this, under our Cybersecurity Tools Development services , we have an offer to develop specific security tools for clients, such as scripts that automate some specific actions, which involves a programming process.

I would like to make a suggestion or complaint

For complaints, suggestions or feedback, you can email us directly at contact@realsec.io, and we will respond promptly.
In case you have a complaint with any of our services, we are sorry to hear that. Please let us know your complaint, and add the Service ID provided when you requested our service, and we will do our best to correct the specified error.

How many people will participate in a RealSec.io service?

That depends on the service in question, as well as the specific requirements of the service. Generally, our OSINT or Application Security services are not as laborious, and can be performed by 1 or 2 of our analysts and engineers. Penetration Testing or Standards Compliance Auditing services may be more extensive, or require the involvement of more brains at the table.

Rest assured that, within the proposal we make you, we will specify in detail the engineers, analysts, and those involved who will participate in the service, as well as their profiles.

Are your OSINT offerings spying services?

No, since that would constitute an illegal activity.
OSINT involves collecting, analyzing, and using information from publicly available sources; all the information gathered is legally obtainable and does not involve any unauthorized access to private or classified data. Spying, on the other hand, implies illicit or covert methods to gain access to confidential or private information without the consent of the target.

I want to hire you today, and get results by tomorrow.

Unfortunately, this is not possible.
Performing cybersecurity assessments and services takes time, and although we try to work as efficiently as we can, it is not possible for us to deliver results immediately. However, it is possible for us to shorten the time by reducing the scope and number of deliverables for a service. If you wish to contact us to hire one of our services, we will take care of making an attractive and efficient proposal.

How do I know what's the service that I should request?

We try to describe each of the solutions in our service catalog as best as possible, however, if you are not sure which one is best for you, we invite you to contact us directly and tell us your specific needs. We will take care of creating a proposal that meets your requirements.

Are there any job opportunities in RealSec.io?

We are always interested in recruiting new members. At the moment, we do not have a job board, however, if you are interested in learning about job opportunities at RealSec.io, you can contact us directly on LinkedIn. We would be happy to hear from you.

Do you endorse malware development?

Yes, as it can be used for good purposes.
Malware development is a discipline that has re-emerged in recent years, and it requires a lot of talent and dedication. There are many people within the Infosec community who passionately share their knowledge about this skill, which is really useful in Penetration Testing or Red Team services, as well as for Blue Team teams to detect sophisticated malware techniques.

There is a stigma that malware development is a bad thing by default, and it is natural to think so, since malware is widely developed and used by cybercriminals. However, there is a large and incredibly good community of people dedicated to malware development in an ethical manner, who have been responsible for establishing it as a consolidated and respected cybersecurity specialty.

Can I hire you to be my SOC team?

At this time, we do not have SOC team capabilities to offer continuous monitoring services, however, we may be able to offer you another solution from our extensive catalog of cybersecurity services. If our services do not make sense to you, we invite you to contact us directly, so that we can work on a proposal that fits your needs.

If I hire a Penetration Testing service, will it damage my environment?

No, it will not. With manage our services with extreme care by implementing actions and redundancies that guarantee that no real damage will be done. Here's a general description of our process:

Before we begin, we make sure to understand the scope and specific requirements of the client. This is incredibly important, as any step outside the requested scope could cause real damage. We set this out in a document called the Penetration Testing Service Agreement, where we explicitly indicate the assets that will be included in the scope, the actions that will and will not be executed, and the duration of this service, so that the client has a complete overview of the service and there is no room for misunderstandings.

Once we have fully established the scope with the client and started the service, we identify and exploit vulnerabilities only in a controlled manner, so that we not only avoid causing damage, but also try not to affect the performance of the environment at all, nor interrupt the day-to-day of any operational process. We also take extreme care of the confidentiality and privacy of what we do. We do not exfiltrate information or upload it to external services, cause denials of service, or expose technical or private information in our reports. In audits that involve code review, we protect the intellectual property of the code at all costs.

Additionally, we ensure that the above is strictly controlled and supervised by implementing quality and safety reviews for each of the phases, planning, actions and deliverables by other auditors in our team, ensuring that there are no defects or errors. The reports and results that we deliver at the end of each service are handled with extreme confidentiality, sent in an encrypted manner, and we ensure that only designated people have access to them.