Sounds quite intrusive ? Sounds jibberish, sounds difficulit, sounds expensive - what is it ?
In a nut shell, we attend onsite and plug in a very small bespoke computer (around 7 x 7 x 2 inches in size). This allows us to run hundreds of tests accross your network trying to breach / find methods that attackers can use to either steal data or hold your business to randsome.
Following our indepth scans, we will provided you with a very detailed report showing all the possible hacks that an attacker could use. Ideally you wont have any, but thats pretty unlikely.
Your report will contain an awful lot of complex results, but we break this down into sections as in the previous reports, listing what you have to do to ensure that attackers cant gain access.
Whilst we cant show you a full report (due to that dreaded data protection and GDPR), we have attached a snapshot of a report.
The following screens will at least show you the type of information we can find following the penetration testing. The report is split into multiple sections, we are only showing a couple of the pages here.
After running our penetration tests, we will review your detailed report and provide you with a bespoke action plan. This will provide you and your IT staff a proper way forward to resolving any issues found.
Additionally, your action plan will contain information about your monthly / quarterly / yearly tasks. These can be quite simple tasks but they have to be done to ensure the ongoing security of your business and that of your customers data.
If you dont have your own IT support staff, we offer a very competitive monthly subscription service, under this agreement we will take over all the required tasks for you, giving you true peace of mind, if you would like to know more about that Click here.