Think Like a Hacker, Secure Like a Pro

Frequently Asked Questions

Cybersecurity can feel complex, especially when threats evolve faster than most businesses can keep up. This FAQ page is designed to give you clear, simple answers to the questions we’re most often asked. Whether you’re concerned about your organisation’s security, considering an investigation, or want to understand how Tanosec Cybersecurity can support you, you’ll find straightforward guidance below. If you don’t see your question here, you’re welcome to contact us directly — we’re always happy to help.

What does Tanosec Cybersecurity do?

We provide practical, real-world cybersecurity services including digital investigations, OSINT, vulnerability assessments, digital footprint analysis, and managed cybersecurity support. Our focus is to help individuals and businesses understand their risks and secure their digital environments.

Do you work with both individuals and businesses?

Yes. We support individuals with online privacy, account issues, data exposure, and harassment concerns. We also assist businesses with advanced assessments, investigations, threat intelligence, and managed cybersecurity services.

Are your services confidential?

Absolutely. All engagements are handled with strict confidentiality. We never share your information, results, or case details with any third party.

Is everything done remotely?

Tanosec operates as a remote-first provider, allowing us to support clients anywhere in South Africa. However, certain specialised services — such as specific security assessments or environment-based projects — are done on-site when necessary.

What should I do if I think I’ve been hacked?

Stop using the affected device or account and contact us immediately. Avoid attempting random fixes — they can worsen the situation. We’ll guide you safely through containment and next steps.

 

How quickly can you respond to urgent matters?

If your message indicates high severity, we prioritise your request. Response time depends on workload, but urgent cases are treated with priority.

What is OSINT and how does it help?

OSINT (Open-Source Intelligence) involves collecting publicly available information to detect risks, verify claims, or support investigations. We use OSINT in digital footprint assessments, threat intelligence, and investigative work.

Do you offer consultations?

Yes. A consultation helps us understand your problem and recommend clear next steps, whether you're an individual or a business.

Can you help if someone is impersonating me online?

Yes. We assist with impersonation cases, fake profiles, and fraudulent accounts. We help gather evidence and advise on takedown procedures.

What if I think someone is monitoring my phone or messages?

We can assess your device for signs of compromise, stalkerware, unauthorised access, or unsafe apps. We'll guide you through securing your accounts and devices.

Can you recover hacked social media accounts?

We assist with compromise investigations and recovery strategies, including securing access, analysing breach points, and preventing repeat incidents.

What is a digital footprint assessment for individuals?

It identifies what personal information about you is exposed online — including leaked email credentials, location data, public records, and high-risk privacy exposures.

Can you help with online harassment or cyberbullying?

Yes. We can advise on evidence collection, personal safety steps, platform reporting, and escalation options.

 

Do you help with scams or suspicious messages?

We analyse suspicious emails, links, messages, business dealings, and payment requests to confirm whether they are legitimate or fraudulent.

How do I know if my personal data has been leaked?

We check breach databases, exposed credentials, public leaks, and online sources to determine whether your data appears in known compromises.

Do you offer personal cybersecurity advice?

Yes. We provide practical guidance on securing devices, accounts, privacy, and online behaviour based on your specific situation.

What do you need from me before starting?

Usually just a description of the issue, relevant accounts, screenshots (if available), and the goal you want to achieve. We’ll guide you from there.

Are your services affordable for private individuals?

We offer clear, upfront pricing. Some services, like footprint assessments or scam checks, have predictable fixed rates.

Do you offer penetration testing services for businesses?

Yes. Tanosec Cybersecurity provides penetration testing (pentesting) to help businesses identify vulnerabilities before attackers do. Our tests simulate real-world threats safely, highlighting security weaknesses and providing actionable recommendations to strengthen your systems. We offer network, web application, and environment-specific pentests — with on-site engagements where required — all tailored to your organizations needs and risk profile.

What cybersecurity risks do South African businesses face?

Common threats include phishing, account compromise, ransomware, insider risks, exposed credentials, misconfigurations, and targeted attacks through social engineering.

What services do you offer to businesses?

We provide Penetration testing, OSINT investigations, vulnerability assessments, security posture reviews, digital footprint reports, breach support, and managed cybersecurity assistance.

Do you offer incident response support?

Yes. We can assist with suspected breaches, unauthorized access, ransomware indicators, compromised accounts, and forensic guidance.

Do you work with small businesses?

Absolutely. Many of our clients are SMEs who need practical, cost-effective cybersecurity guidance without enterprise complexity.

Can you help with employee-related security issues?

Yes. We assess insider threats, compromised accounts, unsafe behaviour, and access mismanagement.

 

What is a digital footprint assessment for businesses?

It reveals public-facing risks such as exposed credentials, open ports, leaked information, staff data exposure, vendor risks, and brand misuse.

Do you provide threat intelligence?

Yes. We identify active threats, malicious actors, emerging risks, and industry-specific vulnerabilities affecting your organisation.

How do on-site visits work for businesses?

For certain services — such as environment assessments or physical reviews — we can schedule on-site work when required.

How do we get started?

Contact us with your requirements or concerns. We’ll review your needs and provide a clear proposal or recommended next steps.