COVID-19: remote delivery options
We have adjusted our delivery methods to allow us to provide penetration testing services remotely where necessary. For more information, please refer to our COVID-19 policy.
CREST-accredited penetration testing services from IT Governance
CREST is an international not-for-profit accreditation and certification body for technical information security companies.
As a CREST member company, IT Governance can give you the technical assurance you need that your cyber defences are appropriate and effective.
Our expert penetration testers will analyse your cyber security vulnerabilities so you can defend your organisation against cyber crime and prevent data breaches.
CHECK penetration testing
CHECK was developed for government departments, public sector bodies and the organisations forming the UK’s critical national infrastructure (CNI) to ensure a standard of testing was performed.
IT Governance can consult on your CHECK penetration testing requirements.
Learn more about penetration testing
Speak to an expert
For more information about how our CREST-accredited penetration testing services can help safeguard your organisation, call us now on +44 (0)333 800 7000, or request a call back using the form below.
Get in touch
Our penetration testing services
Our fixed-price testing packages are suitable for any organisation that wants to identify vulnerabilities targeted by cyber attackers.
Results are presented in an easy-to-understand report, ideal for small and medium-sized organisations, or those with no prior security testing experience.
Organisations that need greater reassurance should consider a level 2 test.
These are more complex assessments that painstakingly identify security vulnerabilities in your hardware and software, systems or web applications and then try to exploit them.
Learn more about penetration testing levels
Click for more information about our pen testing services and how they can help secure your organisation:
Remote working penetration tests
A remote workforce leaves you open to many more threats than you faced with office-based staff.
With remote working now established as the norm for many companies, cyber security has never been more critical.
Our remote testing services will probe your remote access solutions and internal infrastructure that criminals might exploit.
Remote Access Penetration Test
Our remote access penetration test combines a web application and infrastructure test.
Performed remotely, it assesses your externally facing remote access solutions, looking for:
- Inadequate/insecure authentication.
- Weak configurations.
- Default settings.
- Outdated software and patching levels.
Book a remote access penetration test
Remote Compromise Penetration Test
Our remote compromise penetration test will identify:
- Weak configurations (e.g., default settings).
- Outdated software and patching levels.
- Insecure authentication.
- Weak permissions.
- Means of bypassing antivirus software.
Book a remote compromise penetration test
Infrastructure (network) penetration tests
Infrastructure tests probe for security flaws affecting your operating systems and network architecture, such as:
- Servers and hosts.
- Firewalls and wireless access points.
- Network protocols.
There are two types of tests: external and internal.
External infrastructure (network) penetration tests
External infrastructure tests combine automated scans and manual assessments to examine the vulnerabilities that might allow external attackers to access your systems.
Book an external network penetration test
Internal infrastructure (network) penetration tests
Internal infrastructure tests attempt to identify network and operating system vulnerabilities from the point of view of anyone with insider access to your systems, applications or data, such as employees or contractors.
Learn more about internal network penetration tests
Social engineering and phishing tests
Social engineering involves attackers manipulating victims into compromising their security, transferring money or providing sensitive information. A social engineering penetration test or simulated phishing attack will assess your staff’s susceptibility to phishing and other types of social engineering.
Social engineering penetration tests
Social engineering penetration tests highlight vulnerabilities involving your employees and help inform appropriate staff awareness training.
A social engineering penetration test will help you:
- Establish the publicly available information that an attacker could obtain about your organisation.
- Evaluate how susceptible your employees are to social engineering attacks.
- Determine the effectiveness of your information security policy and your cyber security controls at identifying and preventing social engineering attacks.
Book a social engineering penetration test
Phishing penetration tests
A simulated phishing attack establishes your employees’ vulnerability to phishing emails and helps inform appropriate staff awareness training.
We use various techniques, including sending an email to your staff, asking them to take actions that could result in them handing over sensitive information, such as usernames and passwords.
We will then assess their responses and create a report to help you understand where staff training needs to be focused.
Book a simulated phishing attack
More extensive penetration testing (level 2)
If your organisation handles sensitive information where a compromise could have a critical impact and you require a higher level of assurance, please get in touch for a quote.
Get a quick quote