In a new business environment that must contend with both pandemics and cyber crime, allowing your employees to work remotely offers considerable benefits. However, it is important to understand the risks. If your networks are compromised, how far can an attacker get? What systems or data might they access?
Identify and set test objectives: Prioritise specific systems and assets to target, where we will assess:
Download the full service description
At the end of the test, you will receive a comprehensive report broken down into:
High-level, non-technical summary of your business’s risks.
Detailed description of the methodologies followed and the scope of testing.
Overview, consultant’s commentary and detailed descriptions of each technical vulnerability identified and remediation advice.
Download the full service description
This test will be performed using IT Governance’s proprietary security testing methodology, which is closely aligned with the SANS, OSSTMM (Open Source Security Testing Methodology Manual) and OWASP (Open Web Application Security Project) methodologies.
The tester will attempt to compromise two or three of your most important systems, as chosen by your or with help from our expert. Based on your needs, we will identify a set of objectives (e.g. determining what level of access an attacker could gain) or scenarios (e.g. the impact of a phishing attack or an attacker exploiting leaked credentials) for testing.
This service is suitable for most organisations that use remote access solutions such as VPNs and remote desktop software.
Identify and understand the technology-related vulnerabilities affecting your remote access solution and internal network and the business impacts these present.
Demonstrate a strong security posture to clients by providing third-party assurances that your remote access solution is secure.
From the detailed report, you will be able to implement secure measures, thereby reducing the likelihood of a security breach while protecting your brand.
Supports compliance with ISO 27001, the UK DPA (Data Protection Act) 2018 and the GDPR (General Data Protection Regulation), the PCI DSS (Payment Card Industry Data Security Standard), and other laws, regulations and contractual obligations.
Our expert consultant will provide you with updates throughout the project from both technical and non-technical perspectives.
Our established UK penetration testing team has amassed extensive testing experience that ensures clients receive a comprehensive service.