What is penetration testing?
Penetration testing (also known as pen testing or ethical/white hat hacking) is where your website, computer network or wireless network is tested to find vulnerabilities that could be exploited by an attacker.
Our primary objectives in performing a penetration test are to:
- Identify security weaknesses in the system being tested
- Recommend remedial actions to reduce or remove the identified weaknesses
To do this we use the same techniques as a malicious attacker/black hat hacker would use, but rather than then exploiting the security vulnerability, we inform you of what we have found and provide options on how to reduce the chances of an attack being successful
What is the difference between black hat hacker and a white hat hacker?
|A Black hat hacker will…||A White hat hacker will…|
|Hack your website for free||Hack your website and charge you for it|
|Find a vulnerability||Find all the vulnerabilities|
|Gain access to you website||Show how others might gain access to your website|
|Spread malware using your website||Scan and remove any malware|
|Retain access to your website forever||Show how to secure your website against black hat hackers|
|Destroy your company reputation||Protect and enhance your reputation|
|Steal your client list or other critical business information||Maintain the security of your critical business information|
|Expose you to the possibility of legal action||Reduce the risk of legal action against you|
I purchased Cujo as a preventative thing rather than anything else. A testimonial would be easy after some kind of worldwide computer pandemic but we’ve not had one. I purchased it just in case and am happy with it as a result.
Trevor is an expert when it comes to cybersecurity. Over the years, Trevor has given sound advice to help me protect my website from spam-bots and other security threats. If you’re looking to protect your IT systems and your website, I highly recommend speaking to Trevor.
I’ve been to 2 of Trevor’s seminars/lectures recently and both were brilliant; engaging, informative and highly worthwhile, I would definitely recommend them to anyone wanting to learn more about Cybersecurity.
Trevor hosts all my important information on a cloud storage system for me. If there’s a problem, which there was at my end a couple of months ago, the system flags this up and then I get a call from Trevor. He sorted it out very quickly which was a relief for me! His knowledge of cybersecurity is amazing too, if a little scary………..
I bought my CUJO about 6 months ago and I have been very happy with it. Within the first 2 weeks it had identified 2 spyware website and I regularly get an update to my phone to say that it had detected and stopped a threat. It is a very good back up system to regular antivirus software and it stops threats other systems don’t. It covers all the PC’s and phones in our house. I would recommend it to other users
I had the pleasure of attending a workshop, Cybercrime- what can go wrong? as part of the #LBF (Leicester Business Festival) . I found the course to be relaxed yet informative, with Trevor’s warm and friendly style, I was able to participate without any inhibition. His knowledge has proved valuable, allowing a proactive and productive implementation of new processes in the work place.