Frequently Asked Questions


OUR MOST COMMON QUESTIONS




Testing


What's the difference between a pen test or a vulnerability assessment?

A vulnerability assessment lets you know what weaknesses you have that could be potentially exploited by hackers. A pen test finds those weaknesses and actually exploits them.

If you’ve never had either of those done before, we highly recommend starting with a vulnerability assessment before you take the leap and request a pen test.

Ballpoint or rollerball pen?

Ballpoint. Doesn’t bleed through the paper.

How much does a full pen test cost?

With our three tier approach, the price is based on company size and node count (number of devices). These can range from $60 to $120 per device. Types of devices include switches, servers, firewalls, desktops, laptops, and Wi-Fi devices. We don’t count phones and printers in the cost but we test them anyways.

How do I know what I need?

What you need depends on what you’ve had done before. Does your business do regular cybersecurity training? Do you have yearly vulnerability assessments? If so, you would probably be better off taking it up a notch and going for a pen test. But if you’re just starting out on your cyber security, start with something more baseline (and more affordable) like an assessment.


Monitoring


How much does it cost to monitor my network?

It depends on the size of your network and when you want it to be monitored. For example, one firewall could potentially cost between $12K and $18K annually. Of course, the range comes into play depending on what time you want it monitored. Standard hours are 8:00 am to 5:00 pm. The price increases if you want us to increase the amount or add hours outside of normal business operation.

Why would I even need monitoring?

How will you know if your business has been compromised? Or what about potential threats on the inside? It’s easy to accidentally click a bad link or visit a malicious site. Monitoring let’s you have eyes on the inside of your business.

Learn more about our monitoring services.

Can I see a demo before I buy?

You bet! Reach out to our office and request a demo. We’d love to show you the device more in-depth before you commit.


Incident Response


How much can an IR case cost?

If you have an IR Retainer with us already, the cost is going to be $450-$550 per hour.

If you don’t have an IR Retainer with us, it’s going to cost $650-$950 per hour with a 40 hour minimum.

How soon can you be on site if I have an incident?

Typically, we can be on site within four hours. Of course, that can change if we need to fly to your location. But no matter what, we’ll do what we can to get there as fast as we can.

Can you make it so the ransomware was never here?

We can do our best. We’ve not had a case yet where we couldn’t completely get rid of the ransomware and get our client back up and running. After we get your business moving again, we can help put in some measures to make sure it never happens again.

Learn more about what we can do to prevent and fix incidents.


Digital Forensics


Is this for individuals or businesses?

Both! Whether you’re a person needing some pictures recovered or a business needing a preservation of a device, we can help.

What can you do?

A lot. We can recover photos, preserve an image, see if you’ve been hacked, recover old documents, help if your device won’t turn on, and more. Check out our digital forensics page for more information.

Can you testify for me in court?

You bet. We have a couple certified expert witnesses who are able to take the stand for your court case. For more information, check out our court cases page.

How much do typical digital forensics services cost?

Our digital forensics services vary on a case by case basis. Typically, the more data you have or the larger the device, the higher the price. See our digital forensics price sheet for an idea of how much our most popular services can cost.


Everything In-between

Where is Alias located?

Our headquarters is in Oklahoma City, OK but we also have an office in Dallas, TX . Most of the work we do is able to be done remote (or people can mail their devices) so a large portion of our clients are in Oklahoma, Texas, Kansas, Colorado, and other surrounding states.

Cyber security or cybersecurity?

We like to use cyber security. But really, it could go either way.

Are you hiring?

To see a lit of current openings, check out our careers page. We’re always on the hunt for talent. Feel free to send us your resume/qualifications even if we don’t have any current openings.