F.A.Q.

Frequently Asked Questions

  • Quickly identify vulnerabilities that affect your system infrastructure and applications, whether you’re a small or large enterprise.
  • One, consolidated view of your vulnerability data. Integrate into various industryleading scanning technologies.
  • Classify, prioritise and automatically notify relevant teams of threats based on your business rules and risk thresholds.
  • View, track and report on vulnerability indicators in a variety of user-friendly formats.
  • Continuously monitor your risk levels and manage team performance.
  • Affordable subscription-based pricing.
  • Engage all your user communities at no extra cost.
  • Fully serviced technology backed by expert advice.

It’s a state of being exposed to the possibility of being attacked or hacked. It can lead to multiple risks, such as, data file leaks, sensitive information leaks (usernames / passwords), malware, denial of Service attacks, compromised systems, unauthorized access to the network, etc.

The below are all Technical Vulnerabilities:

  • Weak identity management (e.g. default usernames/passwords)
  • Missing security updates (patches) to resolve flaws in off the-shelf software
  • Insecure configuration in off the-shelf software
  • Coding errors in custom developed applications.

Technical Vulnerabilities are exploited by hackers and malware (ransomware, coin miners, viruses, etc.) leading to unwanted business impact, including:

  • Financial loss
  • Damage to reputation or shareholder value
  • Reduced productivity
  • Loss of privacy or intellectual property
  • Legal, regulatory or contractual infringement

Regular penetration tests are certainly recommended for any organisation wanting to keep tabs on their cyber health. Any money spent on a penetration test will cost less than a major breach or the compromising of your site, which can lead to serious down time. What’s more, with GDPR coming into effect, it’s essential that you can demonstrate you are maintaining the highest level of cyber security. The only way to truly get a detailed view of your current security posture is via a penetration test.

Penetration tests can traditionally be run internally within an organization or externally from the internet. The appropriate vantage point for the testing should be determined by an organization’s focus on risk. In addition, the two places for testing are not mutually exclusive. Organizations with a strong focus on risk management will most frequently conduct testing from both an internal and external perspective.

Penetration Testing Operations begin by jointly determining whether the MDM Tech should have some or no knowledge of your environment. We apply its industry experience to identify objectives that represent primary risks to your core business functions.  

We simulate real world phishing attacks that cybercriminals are currently deploying in order to gain access to confidential company data and/or the corporate network.

Our unique phishing infrastructure, phishing software and Command & Control (C&C) will be tweaked on a per assessment basis in order to test & bypass the layered security infrastructure of the targeted organisation.