What is Penetration Testing?

  • 17 Jun 2020
  • Business Security, Web Applications

A penetration test also known as pen testing or ethical hacking is the practice of testing a computer system, networks and web applications to discover any security vulnerabilities within a business.

Essentially it's a controlled form of hacking, Penetration testers work on the businesses behalf to detect any security weaknesses that could be exploited by cyber criminals. It's simply being one step ahead of the criminals minimising cyber attacks on your business.


Web App Pen Testing

Web application penetration testing will test your website or web-app to help uncover vulnerabilities and poor security controls, exploit weaknesses and insecure application functionally.

The tester will use a blend of cutting-edge automated tools and manual hands-on expertise to find and exploit security weaknesses in your mobile, web apps, and APIs.

The main standard or testing methodology used to test is OWASP. Testers are accredited by a number of organisations. The main being CREST, OSCP and Tiger Scheme.


Infrastructure and network penetration testing

Local infrastructure pen tests from our experienced security experts test your external network entry points along with internal network infrastructure.

Infrastructure pen testing effectively detects the flaws in your network and can identify any loopholes where cyber criminals can exploit. It will provide your business with detailed insight on how secure your business network is.


Vulnerability Assessments

A vulnerability assessment will scan and check your computer network and identify any devices on it, including printers, scanners, laptops, mobile phones. It is a systematic review of a businesses’ security measures. The vulnerability assessment will provide a severity of the weakness detected and establish how the vulnerabilities can be fixed.

Generally, the weakest point of any system is human. If a dodgy link is clicked on via an email by staff on a works network hackers will have access to the network and may plant malware or steal information from the business.


To protect your business from cyber attacks you can carry out regular security checks on your computer systems :

  • Check your existing security measures, make sure they are still effective
  • Identify security flaws, this way you can resolve them before they become exploited by cyber criminals
  • Test new software and systems for bugs

For help with any of these get in touch.

Share this page

Go back