|
| 1 | +<!DOCTYPE html> |
| 2 | +<html lang="en"> |
| 3 | +<head> |
| 4 | +<link rel="canonical" href="https://cyb.ersecurity.com/index.html" /> |
| 5 | + <meta charset="UTF-8"> |
| 6 | + <meta name="viewport" content="width=device-width, initial-scale=1.0"> |
| 7 | + <!-- Page Thumbnail for Social Media --> |
| 8 | + <meta property="og:image" content="images/emergency.png"> |
| 9 | + <meta property="og:title" content="Emergency Response Security Group"> |
| 10 | + <meta property="og:description" content="Boutique Cyber Security Services Since 1337"> |
| 11 | + <meta property="og:url" content="https://cyb.ersecurity.com"> |
| 12 | + <meta name="description" content="Emergency Response Security Group - Boutique Cyber Security Services Since 1337. Offering specialized services in incident response, offensive security, malware research, forensics, OSINT, incident response, and more."> |
| 13 | + <meta name="keywords" content="cyber security, security, incident response, consultant, tech, technology, 1099, aggregation, attack, attacksurface, attackvectors, bash, blog, blogging, blueteam, brands, breach, bug bounty, bug sweeps, bugs, c programming, cats, cellphone, cellular, ceos, ceotalks, ceotips , cicd, ciso, cisolife, cisos, cloud, cloud security, cloud security engineer, cobol, computer security, consultant, consulting, corporations, crime, custom cyber security, cyber, cyber security analyst, cyber security architect, cyber security engineer, cyber security researcher, cyberattack, cyber attacks, cyber awareness, cyber awareness month, cybercrime, cyber criminals, cyber defense, cyber security, cyber warfare, dark web, data breach, data breach researcher, data breach, data breaches, datas ecurity, defense, digital footprint analysis, directorjobs, directors, economy, elastic, electric consulting, electric consulting llc, elk, email, emergency, emergency response, emergency response security group, employment, encoding, encryption, engineering, ethical hacking, ethical hackers, ethical hacking, executive, executive protection, experience, experience , exploit development, exploitation, exploits, footprint analysis, forensics, fortran, fraud, gdpr, go lang, google, hacker, hackers, hacking, hackingnews, hackingtools, hacks, healthcare, hipaa, hiring, hiring engineers, hiring talent, hiring tech, incident response, incident response, information security, information technology, infosec, infosecurity, intel, international law, investigations, ir, it security, security operations , cyber jobs, cyber security jobs, lead cyber security engineer, lead cyber security analyst, lead cyber security architect, lead cyber security researcher,cyber security linkedin, log aggregation, logging, malware, malware analysis, malware research, manager development, manager jobs, manager life, managers, marketing, monitoring, reverse engineering, network, network monitoring, network security, networkingskills, networksecurity, noc, offense, open-source skiptracing, pen testing, penetration testing, phishing, policy, privacy, privacy law, private investigation, program building, public investigation, python, recruiters, recruiting, reddit, redteam, research , resume , retainer service, retainer subscription, sales, scam, security, security architecture, security development, security law, security research, securityawareness, securitynews, securityprofessionals, securityresearch, senior cyber security engineer, senior cyber security analyst, senior cyber security architect, senior cyber security researcher, skiptrace, skiptracing, small business, smishing, soc, social engineering, socialengineering, spam, splunk, static code analysis, subscription service, tech, techcommunity, technology, technology blog, testing, texting, text messages, text messagespam, text messaging, threat, threat analysis, threat landscape, threat research, virus, vulnerability, worm, zero day, probono forensics, victim services, victim resources, stalking victim resources, stalking resources, restraining order resources, abuse help, stalker help, victim help, free help stalker, 1337 hacker, hackers, victim services, pro bono, digital forensics, crime, stalking, justice, evidence collection, law enforcement support, forensic analysis, emergency response security group, Rhiannon Williams, non-profit, victim support, digital evidence"> |
| 14 | + <meta name="author" content="Emergency Response Security Group"> |
| 15 | + <meta name="robots" content="index, follow"> |
| 16 | + <meta property="og:type" content="website"> |
| 17 | + <meta name="twitter:card" content="summary_large_image"> |
| 18 | + <meta name="twitter:title" content="Emergency Response Security Group"> |
| 19 | + <meta name="twitter:description" content="Cyber Security Since 1337"> |
| 20 | + <meta name="twitter:image" content="images/emergency.png"> |
| 21 | + |
| 22 | + |
| 23 | +<title>Emergency Response Security Group</title> |
| 24 | +<script> |
| 25 | + document.addEventListener('copy', function(e) { |
| 26 | + e.preventDefault(); |
| 27 | + }); |
| 28 | +</script> |
| 29 | + |
| 30 | + |
| 31 | + |
| 32 | +<script> |
| 33 | + document.addEventListener('contextmenu', function(e) { |
| 34 | + e.preventDefault(); |
| 35 | + }); |
| 36 | +</script> |
| 37 | + |
| 38 | +<!-- Google tag (gtag.js) --> |
| 39 | +<script async src="https://www.googletagmanager.com/gtag/js?id=G-QMLPX8RRD8"></script> |
| 40 | +<script> |
| 41 | + window.dataLayer = window.dataLayer || []; |
| 42 | + function gtag(){dataLayer.push(arguments);} |
| 43 | + gtag('js', new Date()); |
| 44 | + |
| 45 | + gtag('config', 'G-QMLPX8RRD8'); |
| 46 | +</script> |
| 47 | + |
| 48 | + <style> |
| 49 | + body { |
| 50 | + font-family: 'Courier New', Courier, monospace; |
| 51 | + margin: 0; |
| 52 | + padding: 0; |
| 53 | + background: #000000; |
| 54 | + color: white; |
| 55 | + text-align: left; |
| 56 | + font-size: 20px; |
| 57 | + -webkit-user-select: none; |
| 58 | + -moz-user-select: none; |
| 59 | + -ms-user-select: none; |
| 60 | + user-select: none; |
| 61 | + |
| 62 | + } |
| 63 | + header, main, footer { |
| 64 | + padding: 10px; |
| 65 | + text-align: left; |
| 66 | + font-size: 20px; |
| 67 | + -webkit-user-select: none; |
| 68 | + -moz-user-select: none; |
| 69 | + -ms-user-select: none; |
| 70 | + user-select: none; |
| 71 | + margin-inline: 10vw; |
| 72 | + } |
| 73 | + header a, |
| 74 | + main a { |
| 75 | + color: #ff00e1; |
| 76 | + text-decoration: none; |
| 77 | + font-weight: normal; |
| 78 | + text-align: left; |
| 79 | + } |
| 80 | + footer a { |
| 81 | + color: #00FFC6; |
| 82 | + text-decoration: none; |
| 83 | + transition: color .2s ease; |
| 84 | +} |
| 85 | + |
| 86 | + nav { |
| 87 | + font-family: Courier New', Courier, monospace; |
| 88 | + color: #9999ff; |
| 89 | + background: #000000; |
| 90 | + display: flex; |
| 91 | + justify-content: center; |
| 92 | + font-size: 20px; |
| 93 | + flex-wrap: wrap; |
| 94 | + } |
| 95 | + nav a { |
| 96 | + font-family: Courier New', Courier, monospace; |
| 97 | + color: white; |
| 98 | + padding: 14px 20px; |
| 99 | + text-decoration: none; |
| 100 | + display: block; |
| 101 | + font-size: 20px; |
| 102 | + animation: fadeIn 2s ease-in-out; |
| 103 | + } |
| 104 | + nav a:hover { |
| 105 | + font-family: Courier New', Courier, monospace; |
| 106 | + background: #df1313; |
| 107 | + color: green; |
| 108 | + padding: 14px 20px; |
| 109 | + text-decoration: none; |
| 110 | + display: block; |
| 111 | + font-size: 20px; |
| 112 | + animation: pulse 1s infinite; |
| 113 | + } |
| 114 | + nav a:link { color: #00FFC6; } |
| 115 | + nav a:visited { color: #00FFC6; } |
| 116 | + |
| 117 | + @keyframes fadeIn { |
| 118 | + from { opacity: 0; } |
| 119 | + to { opacity: 1; } |
| 120 | + } |
| 121 | + @keyframes pulse { |
| 122 | + 0% { transform: scale(1); } |
| 123 | + 50% { transform: scale(1.1); } |
| 124 | + 100% { transform: scale(1); } |
| 125 | + } |
| 126 | + .content { |
| 127 | + animation: slideIn 1s ease-in-out; |
| 128 | + } |
| 129 | + @keyframes slideIn { |
| 130 | + from { transform: translateY(100px); opacity: 0; } |
| 131 | + to { transform: translateY(0); opacity: 1; } |
| 132 | + } |
| 133 | + #services { |
| 134 | + margin: 20px auto; |
| 135 | + } |
| 136 | + .services { |
| 137 | + text-align: center; |
| 138 | + color: white; |
| 139 | + font-size: 20px; |
| 140 | + } |
| 141 | + |
| 142 | + .scroll { |
| 143 | + text-align: center; |
| 144 | + padding: 1px; |
| 145 | + font-size: 20px; |
| 146 | + font-family: "Courier New", Times, serif; |
| 147 | + flex-wrap: wrap; |
| 148 | + } |
| 149 | + .links a { |
| 150 | + color: #fc03a5; |
| 151 | + text-decoration: none; |
| 152 | + font-size: 20px; |
| 153 | + } |
| 154 | + .links a:hover { |
| 155 | + font-family: "Courier New", Times, serif; |
| 156 | + background: #ffe6ff; |
| 157 | + color: #b00274; |
| 158 | + text-decoration: underline; |
| 159 | + font-size: 20px; |
| 160 | + } |
| 161 | + .home { |
| 162 | + font-family: "Courier New", Times, serif; |
| 163 | + text-align: center; |
| 164 | + color: white; |
| 165 | + font-size: 20px; |
| 166 | + } |
| 167 | + .exploit { |
| 168 | + font-family: "Courier New", Times, serif; |
| 169 | + text-align: center; |
| 170 | + color: white; |
| 171 | + font-size: 20px; |
| 172 | + } |
| 173 | + .container { |
| 174 | + display: flex; |
| 175 | + flex-wrap: wrap; |
| 176 | + gap: 20px; |
| 177 | + } |
| 178 | + .column { |
| 179 | + flex: 1; |
| 180 | + min-width: 200px; |
| 181 | + } |
| 182 | + .checkbox { |
| 183 | + display: grid; |
| 184 | + flex-direction: column; |
| 185 | + grid-template-columns: 1fr 1fr 1fr ; |
| 186 | + align-items: center; |
| 187 | + gap: 10px; |
| 188 | + max-width: 300px; |
| 189 | + margin: auto; |
| 190 | + } |
| 191 | + .checkbox div { |
| 192 | + margin: 5px 0; |
| 193 | + } |
| 194 | + .services-list{ |
| 195 | + text-align:left; |
| 196 | + margin-left:1.5rem; |
| 197 | + list-style-position:inside; |
| 198 | + } |
| 199 | + table { |
| 200 | + width: 100%; |
| 201 | + border-collapse: collapse; |
| 202 | + } |
| 203 | + table, th, td { |
| 204 | + border: 1px solid black; |
| 205 | + } |
| 206 | + th, td { |
| 207 | + padding: 8px; |
| 208 | + text-align: center; |
| 209 | + } |
| 210 | + .example { |
| 211 | + background-color: blue; |
| 212 | + color: #fc03a5; |
| 213 | + } |
| 214 | + @media (max-width: 600px) { |
| 215 | + .checkbox { |
| 216 | + grid-template-columns: 1fr; |
| 217 | + } |
| 218 | + nav a { |
| 219 | + font-size: 14px; |
| 220 | + } |
| 221 | + body { |
| 222 | + font-size: 14px; |
| 223 | + } |
| 224 | + } |
| 225 | + </style> |
| 226 | + |
| 227 | +</head> |
| 228 | +<body> |
| 229 | +<header> |
| 230 | +<center> |
| 231 | +<font size="2"> |
| 232 | +<pre> |
| 233 | + .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. |
| 234 | +offen\sive-s\ecurity♥\malware\researc\h♥foren\sics♥os\int♥inc\ident-r\esponse\♥threat\hunting\♥corpor\ate-esp\ionage-\investi\gation♥\ |
| 235 | +' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' ` |
| 236 | +</pre> |
| 237 | +</center> |
| 238 | +<section id="home"> |
| 239 | +<div class="home"> |
| 240 | +<p> |
| 241 | +<span style="font-family: "Courier New", Times, serif;"> |
| 242 | +<font size="8">E</font><font size="8">mergency </font><font size="10">R</font><font size="8">esponse </font><font size="10">S</font><font size="8">ecurity</font><font size="10"> G</font><font size="8">roup </font> |
| 243 | +</span> |
| 244 | +</div> |
| 245 | +</section> |
| 246 | +</p> |
| 247 | +<font color="#FF00E1"> |
| 248 | +<center><font size="5"><b>Cyber Security since 1337 </b></font></font></center> |
| 249 | +<nav> |
| 250 | + <a href="https://cyb.ersecurity.com/index.html#home">Home</a> |
| 251 | + <a href="https://cyb.ersecurity.com/about.html">About</a> |
| 252 | + <a href="https://cyb.ersecurity.com/index.html#about">Services</a> |
| 253 | + <a href="https://blog.ersecurity.com">Blog</a> |
| 254 | + <a href="https://cyb.ersecurity.com/partners.html">Referrals</a> |
| 255 | + <a href="https://www.linkedin.com/company/emergencyresponse">Linkedin</a> |
| 256 | + <a href="mailto:business@ersecurity.com">Contact</a> |
| 257 | +</nav> |
| 258 | +</div> |
| 259 | +</section> |
| 260 | + |
| 261 | + |
| 262 | +<center> |
| 263 | +<font size="2"> |
| 264 | + <pre> |
| 265 | + .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. .-. |
| 266 | +secur\ity-res\earch♥t\hreat-h\unting♥\reverse\engineer\♥inves\tigatio\ns♥scri\pting♥l\inux-uni\x♥host\ing♥reg\istrars\exploit\s♥vuln♥\ |
| 267 | +' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' `-' ` |
| 268 | +</pre> |
| 269 | +</font> |
| 270 | +</center> |
| 271 | +</header> |
| 272 | + |
| 273 | +<main> |
| 274 | + |
| 275 | +</center> |
| 276 | +</b> |
| 277 | + |
| 278 | +<br> |
| 279 | +<center> |
| 280 | + <img src="images/dragon.png"> |
| 281 | +<br> |
| 282 | +<font color="orange"><b><h2><p>Know thy Enemy</p></font></h2> |
| 283 | +<br> |
| 284 | +</center> |
| 285 | +Email is the most common entry point for cyberattacks targeting small businesses. Hackers often use fake invoices, impersonation schemes, and malicious links to exploit busy teams. At Emergency Response Security Group, we deliver affordable, expert email security designed specifically for small business owners. With 26 years of hands-on experience and more than 55,000 hours in the field, I have built and trained a team equipped to safeguard your inbox, monitor threats, and provide detailed monthly reports so you can focus on your customers instead of cybercriminals. |
| 286 | +We do not just offer tools; we bring an advanced skillset that cannot be taught in schools. Allow us to demonstrate the difference. Our services are effective, reliable, and budget friendly. |
| 287 | +<br><br> |
| 288 | +We also offer consulting services. |
| 289 | +<br><br> |
| 290 | +See more <a href="https://www.linkedin.com/feed/update/urn:li:activity:7383540771330850816/">here</a>. |
| 291 | +<br><br> |
| 292 | + |
| 293 | + <button style="padding: 10px 20px; background-color: #FF00E1; color: white; border: none; border-radius: 5px;">Under Construction</button> |
| 294 | + </div> |
| 295 | +</div> |
| 296 | + |
| 297 | + |
| 298 | + |
| 299 | + |
| 300 | +<center><p> _,.-'~'-.,__,.-'~'-.,__,.-'~'-.,__,.-'~'-.,__,.-'~'-.,_</p></center> |
| 301 | + |
| 302 | + |
| 303 | +<section id="services"> |
| 304 | +<center><font color="orange"><b><font size="5"><p>Service Offerings</p></font></font> |
| 305 | +</b></center><br></center> |
| 306 | +<ul class="services-list"> |
| 307 | +<li>Pre-Disaster Incident Response</li> |
| 308 | +<li>Threat Hunting - Security Research</li> |
| 309 | +<li>Adversary Simulation </li> |
| 310 | +<li>Email Security</li> |
| 311 | +<li>Digital Forensics</li> |
| 312 | +<li>Proactive Security Monitoring</li> |
| 313 | +<li>Post Incident Review</li> |
| 314 | +<li>Corporate Security</li> |
| 315 | +<li>Security Awareness Training</li> |
| 316 | +<li>Senior/Lead Staff Augmentation</li> |
| 317 | +<li>Business Development and Guidance (premium rate)</li> |
| 318 | +</ul> |
| 319 | +<br> |
| 320 | +See <a href="pricing.html">pricing</a> for more detail. We package by the hour or project. |
| 321 | +<br><br> |
| 322 | +Don't get caught with bad posture as ransomware hits. Prepare for an effective response with a professional. |
| 323 | + |
| 324 | +<p> _,.-'~'-.,__,.-'~'-.,__,.-'~'-.,__,.-'~'-.,__,.-'~'-.,_</p></center> |
| 325 | +</center> |
| 326 | + |
| 327 | + |
| 328 | + |
| 329 | +<footer> |
| 330 | +<center> |
| 331 | +<font color="pink">=^..^= =^..^= Emergency Response Security Group</a> =^..^= =^..^=</font> |
| 332 | +<br> |
| 333 | +© 2025 + beyond!</center> |
| 334 | +<br> |
| 335 | +<center> |
| 336 | + * <a href="privacy.html">Privacy Policy</a> * <a href="terms.html">TOS</a> * <a href="careers.html">Careers</a> * <a href="pricing.html">Pricing</a> * <a href="https://orcid.org/0000-0002-8846-4242">Research</a> * <a href="victimservices.html">Victim Services</a> * |
| 337 | +</center> |
| 338 | +<br> |
| 339 | +</footer> |
| 340 | +</body> |
| 341 | +</html> |
0 commit comments