For many clients, the prospect of engaging ethical hacking services is quite daunting, with network availability and integrity being the main concerns. We address this by investing time at the scoping stage, ensuring any subsequent work is carried out within the limits imposed by the client. Whether it be an external or internal pentest, black box or white box, we will help you thoroughly assess risk on your terms.
Could a hacker use your exposed services as a way in to your network? This stage in the ethical hacking process will establish the effectiveness of any patch management policy and examine general network security; what might an attacker be able to get to once they have a foothold? We can help you find the gaps you need to fill prior to anyone with malicious intent doing the same.
How security-conscious are your staff? Would they hand over their login credentials if someone asked nicely? Would they allow someone into the building without proper authority? If deemed within the scope of the ethical hacking process, these are questions that will be answered by us. We will help you assess the risk posed by your staff and identify future training needs going forward.
© 2015 Vis Viva. All Rights Reserved. Registered in England 07649694 | VAT GB113381350 | Excellence in Ethical Hacking Services | All images and logos are copyright their respective owners