Step 1
You click on an executable (simulating what happens when a link in an email is clicked).
Are you absolutely sure your network is secure?
Hackers are constantly trying to break into your computer system by tricking employees into letting them in.
Getting a third-party assessment with Vonahai is critical to determine if your systems are actually secure. We use the exact same methods hackers are using today to check your security on an ongoing basis, regularly testing your security environment just like hackers are.
Imagine the embarrassment of having to notify your clients and vendors that, because of you, their information may now also be in the hands of cyber criminals; paying pricey emergency IT fees while your operations are halted or severely limited for days or weeks, data loss, lost clients, or potential lawsuits. Your bank account drained, with no bank protection.
It doesn’t have to be that way; the Vonahai Penetration Test can change the perspective and the conversation about cyber security.
Secure yourself and your data with a penetration test
Netcare have signed up for a regular penetration test service with a third-party security company called Vonahai. We believe it is essential to get an independent assessment of our security hygiene.
The penetration test will show you how easy it is for hackers to get to your information and also how to create a plan to make sure your team is adhering to good cyber hygiene.
The Vonahai Pen Test is a real-life demonstration of how hackers could get onto your business network, what they could steal or lockdown, an easy checkup on user behaviour and how your IT services provider has been managing things so far.
You click on an executable (simulating what happens when a link in an email is clicked).
Let the executable run once. This takes between 5 minutes and an hour (up to 2.5 hours on older machines). Go about your normal routine as it runs.
We will analyse your results and present our findings as to what a hacker would find on your network. This will include cloud drives, One Drive, DropBox, Box, SharePoint and other file-sharing programs.
Security Patches and Vulnerability Management: Discover whether your network has vulnerabilities resulting from patch management issues
Identify Serious Data Leaks: Locate where sensitive data is stored on your network and make sure it’s being guarded. Hackers commonly exploit both your network and data assets when attacking your network.
Your Network’s Perimeter Defence: Using multilayered boundaries, including a firewall, intrusion prevention and intrusion detection are more critical today than ever before. Our scanner will test whether your firewalls are configured correctly and whether they appropriately alarm.
Measure Your Malware Defences: Determine if you have an appropriate cyber stack that will respond to a simulated virus attack. Deployment of a solution which controls the installation, spread, and execution of malicious code at multiple points is critical.
Identity and Access Management: Learn if your team is using stale, repeated or crackable passwords for accounts on your network. We’ll help you institute security best practices for handling passwords and credentials, such as the usage of multi-factor authentication for remote access, critical accounts and administrative accounts, enforcement of a strong password policy, absence of default and/or shared accounts and more.
Information To Inform Your Cyber Security Decision Making: Gauge where your cyber security REALLY is today. Learn whether data encryption is functioning properly, what information about what a hacker can see around an infected device, and whether your network would withstand an attack (even on one machine!).