The basis of any cybersecurity assessment is an understanding of the current cybersecurity posture of the organization. We begin with a Q&A and then move forward with a SOC2 certified Pen Test and Vulnerability Scan. Once complete, you will receive a remediation report. Remediation can be implemented by your present IT service provider, or we can provide a quote for us to perform any remediation steps.
A penetration test (Pen Test) is an authorized simulated attack performed on a computer system or network device to evaluate its security. Penetration testers use the same tools, techniques, and processes as attackers to find and demonstrate the business impacts of weaknesses in a system.
Vulnerability scanning is an inspection of the potential points of exploit on a computer or network to identify security holes. A vulnerability scan detects and classifies system weaknesses in computers, networks and communications equipment and predicts the effectiveness of countermeasures.