CommSec Communications & Security - Commsec

CommSec Communications & Security

We offer a wide range of IT Solutions & Services specialising in Communications and IT Security.

We focus on understanding our customers business needs and providing solutions that are fit for purpose, cost-effective and of the highest quality.

Pen Test Penetration Testing Penetration testers Vulnerability scanning Vulnerability testing Social engineering Pen test companies Pen test suppliers Penetration Testing companies Vulnerability scanning companies Security pen testing IT security pen test IT security penetration testing IT security vulnerability assessment Security vulnerability testing

Our specialties include:

  • Communications Consultancy
  • IT Security Solutions & Services
    • Penetration(PEN) testing
    • Vulnerability scanning and testing
    • Social Engineering
  • IT Consultancy & Professional Services


penetration test, colloquially known as a pen test, is an authorised simulated attack on a computer system that looks for security weaknesses, potentially gaining access to the system’s features and data.

Vulnerability scanning is an inspection of the potential points of exploit on a computer or network to identify security holes.

Vulnerability testing, a software testing technique performed to evaluate the quantum of risks involved in the system in order to reduce the probability of the event.

Social engineering is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.

A social engineer runs what used to be called a “con game.” Techniques such as appeal to vanity, appeal to authority and appeal to greed are often used in social engineering attacks. Many social engineering exploits simply rely on people’s willingness to be helpful. For example, the attacker might pretend to be a co-worker who has some kind of urgent problem that requires access to additional network resources.

Popular types of social engineering attacks include:

Baiting: Baiting is when an attacker leaves a malware-infected physical device, such as a USB flash drive in a place it is sure to be found. The finder then picks up the device and loads it onto his or her computer, unintentionally installing the malware.
Phishing: Phishing is when a malicious party sends a fraudulent email disguised as a legitimate email, often purporting to be from a trusted source. The message is meant to trick the recipient into sharing personal or financial information or clicking on a link that installs malware.
Spear phishing: Spear phishing is like phishing, but tailored for a specific individual or organization.

More about penetration testing

Located on the outskirts of Dublin (5 minutes from the M50), we can quickly respond to your needs.

Some of our Customers

Talk to CommSec today, to discuss how we can help you with your needs.