Ethical Hacking Services: what could a hacker do?

Client Controlled Ethical Hacking Services

Client Controlled

For many clients, the prospect of engaging ethical hacking services is quite daunting, with network availability and integrity being the main concerns. We address this by investing time at the scoping stage, ensuring any subsequent work is carried out within the limits imposed by the client. Whether it be an external or internal pentest, black box or white box, we will help you thoroughly assess risk on your terms.

Vulnerability Exploitation

Could a hacker use your exposed services as a way in to your network? This stage in the ethical hacking process will establish the effectiveness of any patch management policy and examine general network security; what might an attacker be able to get to once they have a foothold? We can help you find the gaps you need to fill prior to anyone with malicious intent doing the same.

Vulnerability Exploitation
Social Engineering

Social Engineering

How security-conscious are your staff? Would they hand over their login credentials if someone asked nicely? Would they allow someone into the building without proper authority? If deemed within the scope of the ethical hacking process, these are questions that will be answered by us. We will help you assess the risk posed by your staff and identify future training needs going forward.

Contact Us

Contact us to find out more about any of our services. We'll be happy to help. Sitemap | Facebook | Twitter | Google+

© 2015 Vis Viva. All Rights Reserved. Registered in England 07649694 | VAT GB113381350 | Excellence in Ethical Hacking Services | All images and logos are copyright their respective owners