Network and Cybersecurity

Network and Cybersecurity

Our risk assurance and advisory services team works with each client to design the right plan to tackle unique security risks and provide network support.

For a clearer understanding of the potential risk to your network, our team will perform a vulnerability assessment and penetration testing. These applications and utilities give us the ability to assess specific information security threats, indicating how an attacker can get control of your valuable information assets.

Unlike simple vulnerability scanners that only provide a snapshot of the current network configuration, we deploy multiple network penetration applications and utilities that allow us to safely exploit vulnerabilities in your network, replicating the kinds of access an intruder could achieve, and proving actual paths of attacks that must be eliminated.

All agents installed during both the external and internal tests will be safely removed, returning the compromised hosts to their normal state. We will provide a report detailing the hosts that were tested, vulnerabilities that were detected, and remediation measures recommended.

External Penetration Testing

External penetration testing focuses on discovery and penetration of the network from outside the network perimeter. With no prior knowledge, we gather information to identify external access points to your network and target certain entry points to exploit for further testing.

Internal Penetration Testing

Internal penetration testing focuses on network vulnerabilities and opportunities to intercept information that can be used to exploit those vulnerabilities. This testing is done from inside the network perimeter. Many times, we can exploit weaknesses found in our external penetration test during the internal testing.

Wireless Penetration Testing

Wireless penetration testing focuses on vulnerabilities and opportunities to intercept information through wireless networks that can be used to exploit those vulnerabilities.

Web Application Penetration Testing

With software being increasingly deployed over the Internet, the threat of attacks specific to web applications is a growing concern. We test the vulnerability of your web-based applications for the following attack types:

  • SQL injection attacks
  • Remote and local file inclusion vulnerabilities
  • Cross site scripting vulnerabilities (XSS)
  • Insecure direct object reference vulnerabilities
  • Information leakage and improper error handling vulnerabilities
  • Insecure cryptographic storage vulnerabilities
  • Insecure communication vulnerabilities

Search Site

Search Team

Search Articles