Skip to Main Content
Strengthen your email security practices with 50% off e-learning | Shop now
Remote Compromise Penetration Test

Remote Compromise Penetration Test

SKU: 5548
Authors: ITG
Format: 1 test
Published: 07 Apr 2020
Availability: Available
  • Assess the extent to which attackers can access or exploit data, files and systems on your networks.
  • Agree on specific objectives for our team of ethical hackers to exploit.
  • Identify how easy it is for a criminal hacker to exfiltrate payroll data, shared files and other confidential data.
  • Suitable for organisations using remote working solutions.
  • Receive a detailed report and full analysis of the findings, along with recommendations on how to address vulnerabilities identified.
  • Conducted by CREST-certified penetration testers.

Buy now, pay later! Enjoy the benefits of paying by purchase order with an IT Governance corporate account.  Apply online today or call our service centre team on 00 800 48 484 484.

For more information about this service or to get a tailored quote for your organisation, please enquire below and one of our experts will be in touch shortly.Enquire about this service
Description

Can our ethical hackers access your systems and confidential data through your remote access points? 

In a new business environment that must contend with both pandemics and cyber crime, allowing your employees to work remotely offers considerable benefits. However, it is important to understand the risks. If your networks are compromised, how far can an attacker get? What systems or data might they access?

Identify and set test objectives:

  • Prioritise specific systems and assets to target, such as data exfiltration, key server compromise and domain administrator access.

This penetration test will identify:

  • Weak configurations (e.g. default settings);
  • Outdated software and patching levels;
  • Insecure authentication;
  • Weak permissions; and
  • Means of bypassing antivirus software.

What’s included?

  • A detailed consultation to determine specific targets (e.g. files or systems) and the extent of the targeted areas.
  • A scoping plan that targets areas/goals of your choice.
  • An authenticated test to probe your remote access and internal infrastructure for any weaknesses so that you can resolve them before a criminal exploits them.
  • A detailed report with full analysis of findings, along with recommendations on how to address any issues.

 Download the full service description


Benefits

Our penetration will help you:

  • Get real-world insight into your vulnerabilities;
  • Understand whether critical data and systems can be compromised;
  • Discover the most vulnerable route for attack;
  • Identify any loopholes that could lead to the theft of sensitive data;
  • Implement strong authentication and session management controls; and
  • Improve access control.
Conditions

Service conditions

This service package applies to organisations that use remote working solutions. Up to three areas or goals, such as data exfiltration, key server compromise and gaining domain administrator access, can be included in the scope for testing.

The penetration test will be conducted over four days (remotely), excluding report-writing.

The service can be delivered to organisations in any sector or industry, targeting staff both in the office and working remotely.

For organisations that fall outside the eligibility criteria, please contact us on +353 (0) 1 695 0411 for a quotation. We can offer a bespoke service to assess a wider variety of vulnerabilities, which may be particularly suitable for larger or more complex organisations.

Why choose us?

Why choose IT Governance?

  • Penetration tests should only be carried out by experienced consultants with the necessary technical skills and qualifications. Our consultants have strong technical knowledge and a proven track record in finding security vulnerabilities, and can carry out exploits in a safe manner and advise on appropriate mitigation measures to ensure your systems are secure.
  • Our CREST-certified team will provide you with clarity, technical expertise and peace of mind knowing that your web application has been reviewed by experienced testers in line with your business requirements.
  • For Azure clients, our penetration tests comply with the Microsoft Rules of Engagement. This means we take care to limit all penetration tests to your assets, thereby avoiding unintended consequences to your customers or infrastructure.

Customer Reviews

top
Loading...