Cybersecurity can feel complex, especially when threats evolve faster than most businesses can keep up. This FAQ page is designed to give you clear, simple answers to the questions we’re most often asked. Whether you’re concerned about your organisation’s security, considering an investigation, or want to understand how Tanosec Cybersecurity can support you, you’ll find straightforward guidance below. If you don’t see your question here, you’re welcome to contact us directly — we’re always happy to help.
We provide practical, real-world cybersecurity services including digital investigations, OSINT, vulnerability assessments, digital footprint analysis, and managed cybersecurity support. Our focus is to help individuals and businesses understand their risks and secure their digital environments.
Yes. We support individuals with online privacy, account issues, data exposure, and harassment concerns. We also assist businesses with advanced assessments, investigations, threat intelligence, and managed cybersecurity services.
Absolutely. All engagements are handled with strict confidentiality. We never share your information, results, or case details with any third party.
Tanosec operates as a remote-first provider, allowing us to support clients anywhere in South Africa. However, certain specialised services — such as specific security assessments or environment-based projects — are done on-site when necessary.
Stop using the affected device or account and contact us immediately. Avoid attempting random fixes — they can worsen the situation. We’ll guide you safely through containment and next steps.
If your message indicates high severity, we prioritise your request. Response time depends on workload, but urgent cases are treated with priority.
OSINT (Open-Source Intelligence) involves collecting publicly available information to detect risks, verify claims, or support investigations. We use OSINT in digital footprint assessments, threat intelligence, and investigative work.
Yes. A consultation helps us understand your problem and recommend clear next steps, whether you're an individual or a business.
Yes. We assist with impersonation cases, fake profiles, and fraudulent accounts. We help gather evidence and advise on takedown procedures.
We can assess your device for signs of compromise, stalkerware, unauthorised access, or unsafe apps. We'll guide you through securing your accounts and devices.
We assist with compromise investigations and recovery strategies, including securing access, analysing breach points, and preventing repeat incidents.
It identifies what personal information about you is exposed online — including leaked email credentials, location data, public records, and high-risk privacy exposures.
Yes. We can advise on evidence collection, personal safety steps, platform reporting, and escalation options.
We analyse suspicious emails, links, messages, business dealings, and payment requests to confirm whether they are legitimate or fraudulent.
We check breach databases, exposed credentials, public leaks, and online sources to determine whether your data appears in known compromises.
Yes. We provide practical guidance on securing devices, accounts, privacy, and online behaviour based on your specific situation.
Usually just a description of the issue, relevant accounts, screenshots (if available), and the goal you want to achieve. We’ll guide you from there.
We offer clear, upfront pricing. Some services, like footprint assessments or scam checks, have predictable fixed rates.
Yes. Tanosec Cybersecurity provides penetration testing (pentesting) to help businesses identify vulnerabilities before attackers do. Our tests simulate real-world threats safely, highlighting security weaknesses and providing actionable recommendations to strengthen your systems. We offer network, web application, and environment-specific pentests — with on-site engagements where required — all tailored to your organizations needs and risk profile.
Common threats include phishing, account compromise, ransomware, insider risks, exposed credentials, misconfigurations, and targeted attacks through social engineering.
We provide Penetration testing, OSINT investigations, vulnerability assessments, security posture reviews, digital footprint reports, breach support, and managed cybersecurity assistance.
Yes. We can assist with suspected breaches, unauthorized access, ransomware indicators, compromised accounts, and forensic guidance.
Absolutely. Many of our clients are SMEs who need practical, cost-effective cybersecurity guidance without enterprise complexity.
Yes. We assess insider threats, compromised accounts, unsafe behaviour, and access mismanagement.
It reveals public-facing risks such as exposed credentials, open ports, leaked information, staff data exposure, vendor risks, and brand misuse.
Yes. We identify active threats, malicious actors, emerging risks, and industry-specific vulnerabilities affecting your organisation.
For certain services — such as environment assessments or physical reviews — we can schedule on-site work when required.
Contact us with your requirements or concerns. We’ll review your needs and provide a clear proposal or recommended next steps.