This site uses cookies to provide you with a more responsive and personalised service. By using this site you agree to our use of cookies. Please read our PRIVACY POLICY for more information on the cookies we use and how to delete or block them.
  • Hacker attack

Hacker attack

Penetration testing

1. Vulnerability assessment

  • Check of all systems that are accessible externally (from the Internet) (once or periodically)
  • Periodic reviews to check implementation measures
  • Clear report in PDF format with summary and detailed description of findings
  • Immediate communication if critical vulnerabilities are identified

​2. Penetration test

  • Based on the results of the vulnerability assessment
  • Detailed and case-related parameterised security scan
  • Using uncovered vulnerabilities and misconfigurations