A penetration test will help you understand your overall security posture. But, that’s not all. It can highlight the potential risks facing your organisation and help you prioritise areas of investment for remediation and further improvements.
What is a Penetration Test?
First things first, what is a penetration test?
Penetration testing is a method of identifying possible areas of weakness—or vulnerabilities—in your networks and applications. These gaps in IT security could be exploited, exposing your business to potentially serious consequences.
By simulating the behaviour of malicious intruders, in a controlled manner, a Penetration Tester can pinpoint the areas that are most likely to lead to a breach. Once gaps have been identified in your systems and networks, the Tester will provide expert advice for strengthening your defences.
Now, for the six things you can find out about your organisation with a penetration test:
1. Identify network vulnerabilities
During the penetration testing process, a Tester works with the client to define the goals of the test (such as accessing sensitive data), reviews available information, identifies the target systems, and then undertakes various activities to achieve that goal. A penetration test can help determine whether a system is vulnerable to attack, if the defences are sufficient, and which defences (if any) need remediation.
After a penetration test, a comprehensive report will highlight any key areas of risk—detailing the exact methods used to gain access—and recommend mitigation strategies.
2. Determine strength and maturity of security measures
There is a tendency in organisations of all sizes to have one penetration test, act on the report and consider their problems solved. However, today’s IT environments are incredibly complex and rely on hundreds of different components working together. New vulnerabilities are discovered daily, and penetration tests will highlight areas that require attention and where a cyber security strategy is deficient.
Additionally, ongoing testing is a sign of a mature cyber security strategy and not only ensures that new vulnerabilities are detected and reported for remediation, but also shows where a company needs to focus resources to ensure that an acceptable level of security is maintained. Much like your annual check-up at the doctor keeps you healthy, an annual penetration test keeps your systems healthy.
Read further: Are you ready to be hacked?
3. An up-to-date picture of your IT environment
Corporate IT infrastructure is an ever-changing landscape and the larger the organisation, the harder it can be to keep track of who is working on what. A penetration test can find assets and services that should have been disabled prior to deployment that the change control process may have missed.
For example, development environments and assets can often have extra functionality that is not used as it’s not required. That extra functionality can potentially introduce an entry point for a malicious threat actor to exploit and gain unauthorised access to corporate assets.
4. Identify inefficient processes and misconfigurations
A penetration test can also highlight any services or tools that aren’t performing the task for which they were purchased. As an example, PGI recently completed work with a client who had invested a six-figure sum and deployed a site-wide end-point protection system which was found to be incorrectly configured and not protecting the end-points at all.
Having the right tools is important, but if they aren’t configured correctly, they are largely pointless. Identifying tools or programs that are inefficient or misconfigured allows you to know where your gaps are and act accordingly to achieve the maximum level of protection.
5. Security of customer data
It is vitally important to keep customer data secure. A penetration test will help identify if there is a risk that customer data could be accessed and copied without your knowledge - the threat of this happening could come from external or internal actors.
Should a data breach occur, your brand reputation, share price and bottom line could suffer. Some companies never recover from a major breach – TalkTalk’s share price has continued to fall since hackers exposed 1.6 million users’ details in 2015.
On a more positive note, providing potential clients/customers with proof of steps towards becoming secure will inspire confidence and demonstrate the company’s commitment to ongoing security.
Read further: GDPR - where are we now?
6. Understand your ability to detect intruders on the network
A Penetration Tester and a real intruder have similar goal – to find and exploit security weaknesses. While the purpose for each is different, a lot of the behaviours, such as enumeration (information gathering), will look the same to an IT administrator.
Working with the IT Team while a penetration test in underway can help the team to recognise where attacker-like behaviour is being missed. As an example, a port scan (an important part of the information gathering phase) of the Active Directory server should only ever occur during scheduled testing; so, if the port scan performed by the Tester is not detected, this means you wouldn’t be able to detect a real intruder performing that activity.
What did you find out?
A penetration test produces more than just a report – it enables you to understand your security posture and mitigate cyber risk. A good Penetration Tester will work alongside the client to highlight areas of potential risk, with the aim of improving overall security controls and processes, while validating spending on current and future cyber defences.
PGI’s penetration testing experts have worked with clients across a range of sectors to identify their vulnerabilities and improve their security posture. Talk to us today about how we can help you: firstname.lastname@example.org or via phone +44 (0)207 887 2699
Your free global geopolitical
PGI’s Risk Portal tool provides daily intelligence feeds, country threat assessments and analytical insights, enabling clients to track, understand and navigate geopolitical threats.
The Risk Portal gives users up-to-date information and analysis on global affairs.
The Risk Portal allows users to visualise information in a unique and instantly understandable way. Mapping filters enable the visualisation of incidents by threat category, time period, perpetrator and target type.
Risk Portal users can upgrade their accounts to include the Report Builder and Country Profile Generator features. The Report Builder allows users to select information, data and images from the Risk Portal and create bespoke reports and emails.
Subscribers to PGI’s Bespoke services receive tailored analysis on specific sectors and geographies of interest, delivered at a frequency they determine.
Making ongoing compliance easier for you and your business
GDPR is now in force. Make sure your business meets the necessary requirements, providing assurance for all of your customers and employees.
A full audit of your business to assess the level of your compliance against GDPR requirements.
Become GDPR compliant with minimal work. We will conduct an analysis, review, report and implement any necessary changes to your business.
We will conduct simple security assessments to help you understand and mitigate the potential risks to your business.
Get your business ready to face the cyber challenge.
We provide a full range of accredited, certified and bespoke services that assess the resilience of your cyber security posture.
PGI’s Qualified Security Assessors (QSA) will help you meet Payment Card Industry Data Security Standards (PCI DSS).
Find out more on PCI DSS
Demonstrate your commitment to cyber security by achieving and maintaining accreditation for the globally-recognised information security standard.
Find out more on ISO 27001
Understand the threats of phishing and malware to avoid being targeted.
Undertake our phishing vulnerability assessment to reduce your organisation’s risk of attack, by measuring the cyber awareness of your workforce.
PGI will conduct a tailored phishing campaign, using multiple methods, to identify realism and train employees where necessary to mitigate future attacks.
PGI monitor multiple metrics to identify the types of phishing, generate in-depth analytical reports and provide an informed decision to help improve your organisation’s level of security and awareness.
Prevent attacks, respond to breaches and protect your business.
Our bespoke range of cyber security services not only protect your critical assets but provide the education you need to keep your operations and data safe.
Implement this cost-effective cyber security measure launched by the government to prevent cyber-attacks, demonstrate information security commitment to your clients, and attract new business by being recognised as a secure organisation.
Find out more on Cyber Essentials Accreditation
The most effective way to identify how attackers target your organisation’s weaknesses is by evaluating your system, your network security, and reporting on any vulnerabilities that could have an impact on your business.
Find out more on Penetration Testing
If your business has experienced breaches, network compromises or operational disruption, our team of cyber security specialists can deploy quickly, and will begin the process of detecting and eliminating the threat efficiently.
Find out more on Data Breach Response & Recovery
Data Breach Response & Recovery
We prevent attacks, respond to security breaches, and protect your business
Our team of specialists can deploy quickly and efficiently to begin the process of detecting, eliminating and preventing future threats of a breach.
A vital part of the response process is making a copy of your data for safe forensic analysis. We will work with you to preserve and use this evidence to discover the extent of an intrusion.
Find out more on Digital Forensics
We will identify and minimise the risks, as well as the possibility of future risks to your business.
Consistent interaction with your management team and recommendations on how to approach all outcomes that need attention.
Subscribe to our Cyber Bytes Newsletter
Keep yourself in the loop with PGI by signing up to our Monthly Cyber Bytes email. You will receive updates, tips and narrative around what has been happening in the world of information security.