A network vulnerability assessment is a way for your organisation to identify vulnerabilities in your network that a hacker could use to exploit to cause serious harm to your organisation. The process involves having a look at your public facing infrastructure, and then a look at what is present in your internal network.
An external assessment involves our Ethical Hackers taking a look at your network from the outside looking in, the same way a cyber criminal would view your organisation. Our team will map out your public facing network, and any services that can be detected. This information can be used to identify vulnerabilities that hackers would use to attempt to break into your network. Our team will produce a report highlighting these vulnerabilities, and make recommendations on how to mitigate risk and increase resilience.
An internal assessment will detail to your organisation what a hacker could do if they gained access to your office network. This stage simulates an attacker who has successfully breached your internal network perimeter and is attempting to exploit any services present within the infrastructure. For instance, this would simulate a rogue cleaner or visitor connecting to your internal network or a malicious hacker successfully breaching an external device or service and using this to gain a foothold on your internal network. Our Ethical Hacking team will identify weaknesses and vulnerabilities in your network that a hacker would use to cause serious business disruption and harm. Our team will produce a report highlighting these vulnerabilities, and make recommendations on how to mitigate risk and increase resilience.
If you would like to book a cyber security assessment or would just like to find out more, please e-mail [email protected] or call 01786 447 441.