Why get a Penetration Test?
Frequently Asked Questions
Will it Break My Network ?
No, we don’t use the invasive tools that will affect your network. These exercises will probe every port on your IP Address and log the vulnerabilities. It will not brute force/denial of service attack your network (this is something we can do for you also if you would like to arrange separately, but this is not needed on a normal business penetration test).
What do I do if I have problems, do you also remediate ?
With every Cyber Report, we will give you an overview of the problems found during your assessment and the best course of action to remediate any issues found. We also have a service that is charged separately, to assist you in with any necessary remediation works.
Shouldn’t my network Provider secure my network ?
Not really, unfortunately. Your network ISP may also issue you a security device with only a basic level of protection. Still, it is always your responsibility to ensure your IP address is secure at all times.
Will you share any of my data ?
No! Simply not at all, and not ever! No third parties have access to any of the data, whatsoever.
Does it matter what country I'm in ?
In most countries of the world, having the owners permission of the network is suitable enough to conduct a penetration test. However, please do check with us separately if you are particularly worried and we will research this on your behalf.
Can I used this to Certify my business ?
The short answer is yes. In most of the world, the general rule of a penetration test is; the scope is agreed on upfront first with the person or company receiving the penetration test service, and then a report of the outputs is issued. We will then scan the full 65,000+ Ports and up to 55,000 known exploits when testing your network IP Address. This is in line with market expectations for external penetration tests and is enough to suffice for the penetration testing requirement for your network.