Full Penetration Test
This assessment can be operated as a ‘red team’ test where nothing is provided, and we will detail what we can find as an outsider. We can undertake a full penetration test on all your systems, networks, websites or web applications. Using trained and certified ethical hackers or ‘Tiger’ team members, you can be assured that the items in scope will be rigorously tested for vulnerabilities.
We can further undertake a full review of your perimeter defenses, try to gain access to your site as an adversary and use detailed social engineering skills to obtain access to restricted areas. If required, our teams can pose as trusted insiders, contacting staff for information or professing to be support agents to gain access to hardware as part of an ongoing maintenance agreement. Perhaps you are interested to know what happens to USB devices that are found on your premises and who may be curious enough to plug them in?