How often have you gotten a new techy toy (new laptop anybody?) & immediately reached for the set up?
Now think about doing that with a burglar alarm, or new security system. Scary right? So why is your new tech any different?
Our ethical hackers can test the systems you’ve set up to see whether your company has been left wide open to a cyber-attack.
Isn’t it better for this to be tested by someone you trust, rather than a criminal?
Please contact us for more information.
Internal Vulnerability Assessment
This involves a scan & review of your systems to search for such weaknesses as:
This assessment requires access to your internal network & systems.
It simulates the approach a criminal would take to infiltrate your system, whether through the internet or from an insider threat (e.g. an employee).
The service report that results from this will include:
Identifies weaknesses but DOES NOT exploit them as a criminal would
What are the risks with this?
Unfortunately poorly maintained or designed systems can suffer outages during this procedure
How do we minimise this risk?
We ensure that all internal vulnerability assessments are supported with back-out and recovery plans
Do we have any other recommendations?
The IASME Trusted Partner network can provide additional support (e.g. full penetration testing)
They are also certifying bodies for the Cyber Essentials and Cyber Essentials Plus schemes, & so can help you achieve these to
Remote Vulnerability Assessment
This remotely reviews your connection to the internet & searches for potential weaknesses
It uses the same methods as a criminal would to perform renaissance on you
Provides a service report that includes:
This assessment is not the same as penetration testing
Instead, it focuses on identifying what weaknesses there are that may compromise your systems
Uses same tools & methods as criminal hackers
Maps your organisations internet connections
Uses professional intelligence to understand latest threats
Do we have any other recommendations?
The IASME Trusted Partner network can provide additional support (e.g. full penetration testing)
They are also certifying bodies for the Cyber Essentials and Cyber Essentials Plus schemes, & so can help you achieve these too
What are the risks with this?
Although interaction with your system is kept to a minimum, unfortunately poorly maintained or designed systems can suffer outages during this procedure
How do we minimise this risk?
We ensure that all internal vulnerability assessments are supported with back-out and recovery plans
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-advertisement | 1 year | Set by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Advertisement" category . |
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
CookieLawInfoConsent | 1 year | Records the default button state of the corresponding category & the status of CCPA. It works only in coordination with the primary cookie. |
elementor | never | This cookie is used by the website's WordPress theme. It allows the website owner to implement or change the website's content in real-time. |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |
Cookie | Duration | Description |
---|---|---|
_ga | session | The _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors. |
_gat_gtag_UA_159678522_1 | session | Set by Google to distinguish users. |
_gid | session | Installed by Google Analytics, _gid cookie stores information on how visitors use a website, while also creating an analytics report of the website's performance. Some of the data that are collected include the number of visitors, their source, and the pages they visit anonymously. |