Cyber Security Consulting
Gavin is a Cyber Security Consultant from Jamaica supporting companies and people around the world to find and validate security vulnerabilities, harden their systems, manage risk, and develop good computer security habits.
Approach & Methodology
Gavin is experienced with various industry leading methodologies and frameworks combined with experience using both Open Source and commercial security tools often used by attackers.
Gavin is experienced in communicating security issues both technically and non-technically for various audiences. He articulates his findings to support effective remediation and risk management.
Supporting Shareholder Values
Ultimately, Gavin helps to protect what matters most, shareholder value. He uses his cyber security skills to help deter, prevent, detect, and correct unwanted cyber security incidents and breaches.
1. What is Cyber Security?
Cyber Security is the practice of protecting systems, networks, and programs from digital attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. Source: https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html
2. What is the difference between vulnerability, threat, and risk?
Vulnerability (weakness) is a gap in the protection efforts of a system, a threat is an attacker who exploits that weakness. Risk is the measure of potential loss when that the vulnerability is exploited by the threat e.g. Default username and password for a server – An attacker can easily crack into this server and compromise it. Source: https://www.greycampus.com/blog/information-security/top-cyber-security-interview-questions
3. What is the BEST way to protect my network?
There isn’t necessarily a “best” way. The smartest proven way is to adopt a Defense-in-Depth security approach. A Defense-Depth security approach means implementing security controls at multiple layers of interaction which support each other to protect a computer system.
4. What is a Penetration Test?
A Penetration Test is an authorised simulated attack on a computer system to identify security weaknesses so they can be improved.
5. What is the difference between a Black Hat and a White Hat hacker?
Black Hat hackers are those who hack without authorisation. White Hat hackers are authorised to perform hacking exercises. Grey Hat hackers are White Hat hackers which sometimes perform unauthorised hacking activities.
6. Do you Freelance?
Currently, no, but I do volunteer my skills to help companies and people who contact me with issues. My volunteerism provides great value as it allows me to be completely unbiased in my support and everyone seems to really appreciate that.