A penetration test is definitely one of the most effective methods to test IT infrastructure security. Based on the identified vulnerabilities, a simulated cyber attack is launched to uncover weak points. An analysis is performed to suggest medium or long-term solutions.
Most users are aware that their passwords have to be a minimum length and contain special characters. But they do not know exactly how effective their chosen character strings are. Our service checks precisely that: the actual level of security achieved by your employees’ access data. A password audit also raises awareness of this potential risk, and enhances the security of your organisation.
Using various manipulation methods, we test employees’ willingness to disclose information. The “human factor” is actually one of the most common security gaps, since it is easier to obtain access data from a person than via hacking techniques.
This involves simulating a multi-layered attack to test the organisation’s ability to identify and fend off threats. This analysis focuses more on the objectives than on the methods used. Attacks are carried out by a “red team” of specialists who simulate all the methods employed by real hackers to target an organisation’s people and networks, applications and physical security.