encription IT security services THE VALUE OF PENETRATION TESTING FOR DIAGNOSTIC PURPOSES
encription IT security services WHO ARE WE???
encription IT security services WHAT WE WILL SHOW YOU How the malicious hacker works A hacker in action Penetration Testing/Ethical Hacking – What is it? Questions
encription IT security services IT WON’T HAPPEN TO ME The Web Developer Internet connection scanned every 3 minutes May already have a problem – Trojans
encription IT security services WHY The Data Protection Act Payment Card Industry (PCI DSS) Financial Reporting Standards Financial Services Act Good Governance and common sense
encription IT security services THE MALICIOUS HACKER Their Raison d’etre Anywhere in the World Completely indiscriminate Now targeted and organised
encription IT security services A HACKER IN ACTION
encription IT security services WHAT IS A PENETRATION TESTER? Has permission Is trusted Is qualified Keeps up to date
encription IT security services TYPES OF TESTING Black/White Box External Internal Social Engineering Forensics
encription IT security services THE OUTPUT A Report Fixes/support/advice & guidance On-Going – There for you
encription IT security services WHAT TO TEST AND WHEN? Web Site IT Infrastructure (Network) Applications PDA’s/Laptops People Suppliers/Partners
encription IT security services WHAT WE HAVE SHOWN YOU How the malicious hacker works A hacker in action Penetration Testing/Ethical Hacking – How it works
encription IT security services for Your Security Give us a call