05 Mar 2024
Internal Vulnerability Assessment
This involves a scan & review of your systems to search for such weaknesses as:
- Poorly maintained or designed systems
- Insecure Wi-Fi networks
- Insecure access controls
- Opportunities to access & steal sensitive data
This assessment requires access to your internal network & systems.
It simulates the approach a criminal would take to infiltrate your system, whether through the internet or from an insider threat (e.g. an employee).
The service report that results from this will include:
- Plain language – making it easy to understand
- Definitions of your weaknesses & associated risks
- Plans and guidance on how to fix those risks
Identifies weaknesses but DOES NOT exploit them as a criminal would
What are the risks with this?
Unfortunately poorly maintained or designed systems can suffer outages during this procedure
How do we minimise this risk?
We ensure that all internal vulnerability assessments are supported with back-out and recovery plans