Penetration Testing
Penetration testing is a vital part of good business practice these days, but commonly overlooked. It is where we simulate an attacker attempting to gain access to your network either by way of an out-of-date application plugin, bad code, an unpatched server, social engineering or a dedicated or targeted attack.
Pen testing is recommended whenever developers, hosting providers or your own IT incumbent make changes in any application, server or database. If you have live web-facing services a pen test is vital.
Penetration testing typically includes:
- Network footprint mapping
- Scanning – outside, inside, wireless and mobile fleet
- Application layer scanning
- Database layer scanning
- Web facing scanning
- Staff profiling and risk assessment
- Removable device risk assessment
- Social engineering risk assessment
A full report of our findings using our tricks and technology can allow a business to gain greater insight into any pitfalls, therefore plugging gaps and providing security to their staff and their customers.