Skip to Main Content
Cyber Security as a Service: Your complete cyber security solution from just £245 per month. Learn more
Remote Compromise Penetration Test

Remote Compromise Penetration Test

SKU: 5548
Authors: ITG
Format: Penetration testing
Published: 07 Apr 2020
Availability: Available
  • Assess the extent to which attackers can access or exploit data, files and systems on your networks.
  • Agree on specific objectives for our team of ethical hackers to exploit.
  • Identify how easy it is for a criminal hacker to exfiltrate payroll data, shared files and other confidential data.
  • Suitable for organisations using remote working solutions.
  • Receive a detailed report and full analysis of the findings, along with recommendations on how to address vulnerabilities identified.
  • Conducted by CREST-certified penetration testers.

Buy now, pay later! Enjoy the benefits of paying by purchase order with an IT Governance corporate account. Apply online today or call our service centre team on +44 (0)333 800 7000.

For more information about this service or to get a tailored quote for your organisation, please enquire below and one of our experts will be in touch shortly.Enquire about this service
Overview

Can our ethical hackers access your systems and confidential data through your remote access points? 

In a new business environment that must contend with both pandemics and cyber crime, allowing your employees to work remotely offers considerable benefits. However, it is important to understand the risks. If your networks are compromised, how far can an attacker get? What systems or data might they access?

Identify and set test objectives: Prioritise specific systems and assets to target, such as data exfiltration, key server compromise and domain administrator access.


This penetration test will identify:

  • Weak configurations (e.g. default settings);
  • Outdated software and patching levels;
  • Insecure authentication;
  • Weak permissions; and
  • Means of bypassing antivirus software.

What’s included?

  • A detailed consultation to determine specific targets (e.g. files or systems) and the extent of the targeted areas.
  • A scoping plan that targets areas/goals of your choice.
  • An authenticated test to probe your remote access and internal infrastructure for any weaknesses so that you can resolve them before a criminal exploits them.
  • A detailed report with full analysis of findings, along with recommendations on how to address any issues.

 Download the full service description


Benefits

Our penetration will help you:

  • Get real-world insight into your vulnerabilities;
  • Understand whether critical data and systems can be compromised;
  • Discover the most vulnerable route for attack;
  • Identify any loopholes that could lead to the theft of sensitive data;
  • Implement strong authentication and session management controls; and
  • Improve access control.
Conditions

Remote compromise Penetration test pricing

  • 1 test: £6,000

Service conditions

  • This service package applies to organisations that use remote working solutions. Up to three areas or goals, such as data exfiltration, key server compromise and gaining domain administrator access, can be included in the scope for testing.
  • The penetration test will be conducted over four days (remotely), excluding report-writing.
  • The service can be delivered to organisations in any sector or industry, targeting staff both in the office and working remotely.
  • For organisations that fall outside the eligibility criteria, please contact us on +44 (0)333 800 7000 for a quotation. We can offer a bespoke service to assess a wider variety of vulnerabilities, which may be particularly suitable for larger or more complex organisations.
Why IT Governance?

Why choose us?

  • Penetration tests should only be carried out by experienced consultants with the necessary technical skill set and qualifications. Our consultants have strong technical knowledge and a proven track record in finding security vulnerabilities. They can carry out exploits in a safe manner and advise on appropriate mitigation measures to ensure that your systems are secure.
  • Our CREST-certified penetration testing team will provide you with clarity, technical expertise and peace of mind knowing that your wireless network has been reviewed by experienced testers in line with your business requirements.
  • For Azure clients, our penetration tests comply with the Microsoft Rules of Engagement . This means we take care to limit all penetration tests to your assets, thereby avoiding unintended consequences to your customers or your infrastructure.

Customer Reviews

This website uses cookies. View our cookie policy
WIN £100
Loading...