The Cyber Security Vulnerability Assessment & Pentest Service seeks to assess compliance to standards and identify vulnerabilities, through the online or onsite analysis of CIS, infrastructure, web, mobile, wireless, to allow remediation to occur.
Online Vulnerability Assessment and Remediation Support: Provision of Online Vulnerability Assessment resources to carry out continuous and dynamic evaluations / audits of CIS infrastructures / systems to identify any vulnerabilities in software or configurations and to provide detailed reports.
Includes the conduct of the following checks:
Remediation Support: OVA reports containing cyber security hygiene indicators status, findings and prioritized remediation measures. Advising on mitigation techniques, escalating issues, with the objective of closing vulnerabilities at sites.
On-Site Vulnerability Assessment and Remediation Support: Provision of resources to carry out Security Assets checks on customer CIS, including Industrial Control Systems and Building Management Systems, to ensure compliance with Cyber Security Standards & CIS security policies, directives and guidance documents including Security Guidance that the customers has approved.
Includes the conduct of the following checks:
Remediation Support: Processing follow up sheet report. Advising on mitigation techniques and escalating issues, with the objective of closing vulnerabilities at sites.
Penetration Testing: Provision of resources to evaluate the security of computer systems or networks by simulating an attack from malicious outsiders or insiders and to provide detailed reports about the findings.
Red Teaming: Provision of resources to evaluate the security of computer systems or networks by simulating an attack from malicious outsiders or insiders with no notification to personnel other than IT Director and security officer and to provide detailed reports.
Web Application / Database Security Audit: Provision of resources to assess internet facing web applications for security mis-configuration, vulnerabilities and coding bad practices, as well as identifying security weaknesses in databases to help prevent data breaches. The findings and remediation recommendations are provided with the assessment report.
External Attack Surface Monitoring: Provision of resources to continually assess the exposure of Customer CIS to the Internet. The findings and remediation recommendations are provided with the assessment report.
Phishing / Social Engineering Simulation Campaigns: Provision of resources to configuring phishing simulation campaigns and run them. The findings and remediation recommendations are provided with the campaign reports.
Mobile Vulnerability Assessment: Provision of real time monitoring of an organisation's mobile assets, with the purpose of presenting realistic and effective countermeasures to limit the disclosure of intelligence information to unauthorised personnel, for security mis-configuration, vulnerabilities and coding bad practices. The findings and remediation recommendations are provided with the assessment report.
Network Scanning: Provision of resources to perform scanning on wired or wireless networks to identify and remedy potential security flaws. The findings and remediation recommendations are provided with the assessment report.
Wireless network penetration test: support identifying Wi-Fi networks, including wireless fingerprinting, information leakage, and signal leakage, determining encryption weaknesses, such as encryption cracking, wireless sniffing and session hijacking, identifying opportunities to penetrate a network by using wireless or evading WLAN access control measures and identifying legitimate users’ identities and credentials to access otherwise private networks and services.
The main differences in the way a Pentest is performed by us:
The Service is available in the following options: