Hacker attack

Penetration testing

1. Vulnerability assessment

  • Check of all systems that are accessible externally (from the Internet) (once or periodically)
  • Periodic reviews to check implementation measures
  • Clear report in PDF format with summary and detailed description of findings
  • Immediate communication if critical vulnerabilities are identified

2. Penetration test

  • Based on the results of the vulnerability assessment
  • Detailed and case-related parameterised security scan
  • Using uncovered vulnerabilities and misconfigurations

Contact us

I have read and agree to the legal note and the online data protection notice.