top of page

IT Services and Security

Maintain  -  Install  -  Upgrade
New installs, upgrades and repair of existing equipment

- Hardware/software installation
- Server setup and deployment
- Upgrade existing hardware/software
- Backup and restore data (onsite & offsite)
- Virus/Spyware/Malware detection and removal

- Spam filtering services

- Product procurement 

 

Networking
Interconnecting devices wired or wireless

- Configure and deploy scalable networks

- Cabling  (also cable cleanup)
- Installation of network equipment
- Wireless planning and implementation
- Server room design (AC, fire suppression, etc.)

 

Specialized Services
Providing high end services

- Cloud Migration

- VOIP/Telephony installation/maintenance

- Virtualization  (VMware, Hyper-V, Nutanix, etc.)

- Disaster Preparation/Recovery

- Large scale software deployments
- Audio/Visual integration for boardrooms or entertainment
- Compliances (PCL, SOX, etc.)

Young Programmer
IT Services
dan-schiumarini-dcL8ESbsGis-unsplash copy.jpg

Cloud Migration and Maintenance

exchange.png
Microsoft365_logo.png
The-Latest-Updates-from-Google-Workspace.jpg
MS-365-1280x720.jpg

Local Network

azure.png

Cloud and Local Backup

Our experience working with some big players in the financial industry have allowed us to learn and deploy the most secure networks and continually adapt and be proactive, not reactive, to any threats

Secondary only to security, backups are a vital aspect of any companies ongoing security and availability.

Hiloma's Backup architecture is is optimized for ultra fast data transfer, and cloud storage is included in your price.

​​

  • Physical and virtual server backup

  • Backup documents

  • Backup for Microsoft 365

  • Faster backups and restores

  • Bare metal recovery

  • Recovery testing

  • Security-focused storage

  • Archiving at no extra charge

Choose the location where you would like your data stored in secure/compliant datacenters. 

Security info: 

  • Certifications (Canada) - HIPAA, ISO27001, NIST 800-53, PCI DSS, SOC 1 Type II, SOC 2 TYPE II

  • AES 256-bit encryption

  • Encrypted on-site, then transferred over one-way TLS 1.2 connections and stored encrypted in the certified datacenter.

  • Backup data is only decrypted during a recovery at the business site

Our Core Values

Infomation Security

Businessman on blurred background using antivirus to block a cyber attack 3D rendering.jpg
Security Testing

 

How vulnerable are you?   Most companies do not ask this question until it's too late.  We can test both your physical and network security and provide a detailed report of the vulnerabilities encountered. 

 

Types of testing -  Below you will see our individual services that we offer.  Many of these services should be used in conjunction with the others in order to have a true sense of your security vulnerabilities. Once completed we will provide a detailed report of the security vulnerabilities and an action plan on how to resolve these issues. 

Penetration Testing

 

Why should you worry about penetration testing?

 

-Security breaches and service interruptions are costly

-It is impossible to safeguard all information, all the time

-Penetration testing identifies and prioritizes security risks

 

A penetration test is a proactive and authorized attempt to evaluate the security of an IT infrastructure by safely attempting to exploit system vulnerabilities, including OS, service and application flaws, improper configurations, and even risky end-user behavior. Such assessments are also useful in validating the efficacy of defensive mechanisms, as well as end-users’ adherence to security policies.

Application Security Testing

 

Application Penetration Testing services will perform tests on your custom web applications as well as standard applications like antivirus, embedded applications, games, and other system applications against any potential vulnerabilities. 

 

Using ethical hacking techniques, we simulate real world attacks to demonstrate how vulnerabilities can be exploited to compromise your systems and confidential data.

Social Engineering Testing

 

As secure as your network may be, the weakest link is often the users. With the amount of personal information available on the internet it's never been easier to find vulnerabilities within the users themselves.

 

For many companies, employees are often overlooked as a potential threat to company security, not realizing that a skilled social engineering attack could compromise the entire organization. Even the best network and systems security will not prevent an attack directed at your employees. Malicious hackers can be extremely effective at coercing people to break their normal security procedures and divulge confidential/critical information. 

Wireless Penetration Testing

 

We offer a wide range of Wireless Penetration Testing services, from security tests of standard corporate Wi-Fi networks to assessments of specialized wireless solutions.

 

For corporate Wi-Fi deployments, we identify wireless exposures using techniques including information gathering, traffic sniffing, and authentication bypassing. We also offer custom research services and security evaluations for technologies including wireless IPS, wireless payment devices, and other solutions.

Source Code Audits

 

During a Source Code Security Audit, our experts manually inspect the source code of your new or existing application for security weaknesses. This service includes:

 

  • Review of authentication, authorization, session and communication mechanisms

  • Identification of programming-related issues such as buffer overflows

  • Identification of input and output related vulnerabilities

  • Review of third-party libraries

  • Security validation of cryptographic functions and routines

 
Physical Breach Testing

 

Sometimes data is only as secure as the location it's being stored at. We use ethical means to test the physical security of a location. 

 

This is done in many ways and can be conducted at different periods to identify the weakest security spots. 

 

This in conjunction with our other services, such as social engineering testing, can provide a very comprehensive idea of the main vulnerabilities of your location(s). 

InfoSEC

Development

Development
Windows Applications
 

Whether your company needs to update outdated software or to build an application to help drive your business into the future, Hiloma is able to understand and work with you in order to develop what's right for your organization. 

 

With decades of experience working with the medical and financial industries, we have been able to help clients become more productive and increase overall workflow by using our programming experience

 

-C, C++, Java, bash scripting, python, php, VB.net, Active Server Pages, JavaScript.

 

 

Linux Applications

 

Behind every successful company there most likely lies a Linux server performing critical tasks to allow your company to run at its highest efficiency.  

 

Depending on the infrastructure and needs of the client, choosing a platform becomes crucial in the decision making.  Linux based platforms are a great alternative and can help in providing a cost effective, yet powerful solution. Hiloma can leverage the flexibility and scalability of this platform and integrate it within your existing network.

 

Database Services

 

Databases can able to leverage the large amount of information, an organization has to process.  Whether it be MySQL, MsSQL, PostgreSQL, we have the ability to design, deploy, maintain, and recover to solution that will handle your sensitive information.

 

Many crucial applications rely heavily on databases to read and write information.  Proper structure and maintenance are key to keeping a healthy database.  We at Hiloma strive to make sure that your companies information is safe, fast, and reliable. 

Cyber Security Training

CyberTrainin
bottom of page