Vulnerability Scanning is a controlled assessment carried out to test your IT security and identify weaknesses that could be exploited by criminals.
The outcome is knowledge that gives you the opportunity to resolve security issues before they become a problem and plan your budgets to plug any gaps.
What does this service do for my business?
Identifies any potential internal or external vulnerabilities in your IT infrastructure.
Once any weaknesses or vulnerabilities are discovered, a remedial plan can be put together to harden the security of your IT infrastructure.
This will increase your IT security and minimise the risk of a data breach.
Why do I need this service?
A stitch in time…
A Vulnerability Assessment will test your systems both externally and internally and highlight any areas of weakness.
If there are chinks in your IT armour, it’s best to find them before they are discovered by someone with malicious intent, e.g. a hacker or an employee with a grudge.
You can then take action to plug the gaps before they turn into a serious breach.
How is this service delivered?
We can assess a certain area of your network, site, website or specific devices.
We begin by defining the scope for the assessment, i.e. what devices are to be included?
Are we just testing company-owned devices or any device that can be used to access the network, such as employees’ private tablets, laptops and phones?
We can then carry out ‘red team attacks’, challenging your defences with manual and automated tests, from which we will produce a vulnerability report with recommendations for potential resolutions.
This can be passed to the relevant personnel for actioning and, if required, we can carry out a full penetration test to see how deep the holes are. We can then run through the report with you, and discuss your options.
What are the added benefits?
Vulnerability Assessments identify exposure to external attacks, e.g. hackers, emulate eternal threats, e.g. employees, and test defences without impacting on servers.