Network Vulnerability Assessment
How vulnerable are your devices and network to attack?
An essential service for small businesses, which tests your IT system configuration using the same techniques used by hackers to ensure your company is not wide open to cyber an attack.
Remote Vulnerability Assessment
If your organisation is connected to the internet, this service will remotely review that connection in the same way as an attacker would perform reconnaissance, looking for potential weaknesses.
The service uses the same toolsets and skill sets as hackers use to map your organisation's internet connections. This service also benefits from regional Police and National Cyber Security Centre intelligence to capture the very latest known threats and techniques used by cyber criminals.
It should be noted that although the interaction with your systems is kept to a minimum, there is always a risk that poorly maintained or designed systems can suffer outages during vulnerability assessments. That is why all remote vulnerability assessments are supported with back-out and recovery plans agreed in advance to minimise risk.
Remote vulnerability assessments are not penetration tests, where the goal is complete systems compromise or to take full control of your systems. Remote vulnerability assessments are focussed on identifying weakness that might be used to achieve that compromise. Service reporting will provide a plain language interpretation of the results and how any vulnerabilities might be used by an attacker, as well as simple instructions on how any vulnerabilities might be fixed.
Internal Vulnerability Assessment
This service requires access to your internal network and systems in order to simulate someone who has gained access from the internet or an insider threat from an employee.
The service will scan and review your internal networks and systems looking for weaknesses such as poorly maintained or designed systems, insecure Wi-Fi networks, insecure access controls, or opportunities to access and steal sensitive data.
The service will identify weaknesses, but not exploit them. It should be noted that although the interaction with your systems is kept to a minimum, there is always a risk that poorly maintained or designed systems can suffer outages during vulnerability assessments. That is why all internal vulnerability assessments are supported with back-out and recovery plans agreed in advance to minimise risk.
Service reporting will describe in plain language, what each weakness means to your business and the risks associated with each. Service reporting will include plans and guidance on how to fix those weaknesses.