Cyber Security Solutions


Protection of business, government and personal communications, including conversations, emails, and intellectual property, is critical to maintaining your competitive edge and peace of mind. Torres has the technology, methods and experts to protect you from unwanted cyber-intruders, whether they are competitors, governments, criminals, terrorists or “joy” hackers. Today, cyber-intruders have developed sophisticated methods of accessing and stealing your enterprise’s intellectual property. They use high-tech devices and software to illegally access company and personal data, whether via phone networks, computers, servers, databases or hand-held devices such as smart phones. They download or transmit to unwanted third-parties your corporate financial and banking data, business models, client and employee databases and more. They listen to, record and transmit your business and personal conversations from around the corner and across the globe. They access, transmit and save your emails, text messages, credit card and personal bank information, personal identification numbers (PINs) and personal financial data with increasing ease. Torres’s Cyber Security Division delivers comprehensive and effective solutions to prevent unwanted intrusion and theft of intellectual property and communications. Torres provides these services to government, private enterprise and
individual customers around the world.

Case Study: Torres was contacted by an embassy after a foreign government compromised the embassy’s network security and stole sensitive state information, including emails and intellectual property. Within 48 hours, Torres implemented firewalls that successfully identified and blocked further attempted intrusions.

Torres’s cyber security capabilities and services can help you meet the following objectives:

Defend Your Business, Government and Personal Information Assets

 Identify Key Vulnerabilities in Your System’s Infrastructure, Including: 

  • Identify Vulnerabilities via Penetration Testing of Systems, Networks and Databases
  • Identify Attempts to Access Systems, Networks or Databases
  • Identify Attempts to Compromise or Damage Systems, Networks or Databases
  • Identify Theft of Intellectual Property

Prevent Intruders from Illegally Monitoring Your:

  • Mobile Phone, Video Teleconference (VTC) and Voice Communications
  • Computers and Wireless Networks
  • Web Activity, including Website Access and Utilization, Online Banking and Credit Card/Purchasing History

Identify and Prevent the Illegal Recording or Transmitting of Information from Your: 

  • Personal and Business Hand-Held Devices (e.g., Mobile Phones) and Phone Networks
  • Computers, Databases and Wireless Networks
  • Email Communications
  • Credit Cards and Banking Accounts

 Prevent Hackers from Damaging or Illegally Penetrating Your: 

  • Business or Personal Websites
  • Social Media Accounts or Blogs
  • Credit Cards and Banking Accounts
  • Email Communications
  • Computer Networks (Fixed and Wireless) and Databases
  • Personal and Business Mobile Devices or Fixed-Line Phone Networks

 Identify Intruders that Illegally Access, Listen to, Store and Transmit Information from Your:

  • Personal or Business Mobile Phone Conversations
  • Home Phone Communications
  • Business Fixed Line Phone Communications
  • Skype and Email Communications
  • VTC and Conference Call Communications
  • Credit Cards and Bank Information
  • Personal or Business Databases
  • Computer Networks (Fixed and Wireless)

Identify Bugging Devices on Your:

  • Personal or Business Mobile Devices
  • VTC and Conference Call Networks
  • Phone Networks
  • Computer Networks (Fixed and Wireless)

Torres’s Cyber Security Courses

  • Basic Cyber Security Defense Course
  • Basic Cyber Security Offensive Course
  • Intermediate Cyber Security Defense Course
  • Intermediate Cyber Security Offensive Course
  • Advanced Cyber Security Defense Course
  • Advanced Cyber Security Offensive Course

 Law Enforcement Application of Cyber Security Posture

  • Intercept Electronic Communications of Suspects and Criminals
  • Identify Locations of Suspects and Criminals via Email and Messages
  • Hack Suspect and Criminal Computer Databases and Networks to Collect Intelligence
  • Place Bugging Devices to Monitor and Record Suspect and Criminal Phone Systems
  • Attack and Neutralize Websites with Illegal Content