/ 01
Ethical hacking

We audit your systems to find security weaknesses. We follow the same strategies and tools of a malicious attacker to create a breach. Thus, we are able to find the security weaknesses of your systems.

We use the OWASP and MITRE frameworks, as a knowledge base and behavioral model of cyber-attacks, to operate within networks and systems.

/ 06
Contents
  • Content strategy.
  • UX Writing.
  • Copywriting SEO friendly.
/ 05
Web accessibility
  • Accessibility audits applied to visual design.
  • Design based on WCAG 2.1 standards.
/ 04
Analytics
  • Web/app analytics reporting and tracking.
  • Definition of KPI strategies.
  • Conversion Rate Optimisation (CRO) tracking.
/ 03
Creativity
  • Art direction.
  • Visual design.
  • Branding digital.
  • Digital style guide.
/ 02
UI
  • Interface design (web & app).
  • Design System.
  • Micro animations.
  • Accessible design WCAG 2.1.
  • Layout QA.
/ 01
UX
  • Qualitative and quantitative research (UX research).
  • Market and trend research.
  • Heuristic and usability audit.
  • Information architecture and process definition.
  • Wireframing.
  • Prototyping.
  • Interaction design.
  • User test.
  • Testing laboratory.
  • Process QA.