Skip to main content
Oakstone Security Group

An official website of Oakstone Security Group

FAQ

These are some of the most common questions we receive. If you don’t see what you’re looking for here, please contact us.

Every engagement begins with a mutual NDA and a clearly defined scope of work. We do not discuss, disclose, or reference our clients in any context, publicly or privately. Your identity, your circumstances, and our findings remain strictly confidential.

This is not a policy we apply selectively. You can read more about how we work on our methodology page.

It depends on scope. A focused web application assessment typically takes 3–5 days. A comprehensive network penetration test may run 1–2 weeks. Personal advisory and executive protection engagements are scoped individually based on your situation and requirements.

Every engagement begins with a detailed statement of work so you know exactly what will be assessed, how long it will take, and what you will receive at the end.

Our advisory services are designed for anyone who wants to take their personal security seriously. This includes families looking to harden their home networks and devices, individuals concerned about their digital footprint, and high-profile or high-net-worth clients who require a greater level of discretion and protection.

Engagements can be as straightforward as securing a home Wi-Fi network, or as comprehensive as designing a full personal security architecture, including hardened devices, secure communications, travel OPSEC, and intelligence profiling. If you are unsure whether your situation warrants our support, contact us confidentially and we will help you assess your needs.

Every report includes an executive summary written for non-technical stakeholders, a detailed technical breakdown of each finding, reproduction steps and supporting evidence, severity ratings using industry-standard frameworks, and prioritised remediation guidance.

We walk you through the findings personally before final delivery. You will never receive a report and be left to interpret it alone.

Penetration testing is a simulated cyberattack conducted by security professionals to identify vulnerabilities in your systems before real attackers do. Rather than waiting to discover weaknesses through a breach, a penetration test gives you an honest, evidence-based assessment of your current security posture, along with clear, prioritised guidance on how to address what we find.

Whether you run a business, manage sensitive data, or simply want to understand your exposure, a penetration test is one of the most effective investments you can make in your security.

© 2025 - 2026 Oakstone Security Group All Rights Reserved.