A penetration test is a simulation of a hacker attack on a network, system, application or website used to discover existing weaknesses before hackers find and exploit them.We determine feasibility of an attack and the amount of business impact of a successful network compromise. We test and report all potential vulnerabilities both externally and internally that result from improper system configuration, hardware or software flaws and missing patches.

Any security issues that are found will be presented to the system owner together with an assessment of their impact and often with a proposal for mitigation or a technical solution.

Our network security assessment team’s approach addresses wide-ranging needs for our clients and we offer an in-depth and comprehensive penetration testing service that audit systems from an external or internal perspective.

External penetration testing - usually takes place across the Internet to simulate the view of your systems through the eyes of a potential attacker.

Internal penetration testing - enables a business to comprehensively evaluate how easily internal employees are able to access sensitive information.

Why Network Security Assessment / Penetration test?

  • Preventing financial loss through fraud (hackers, extortionists and disgruntled employees)
  • Protecting your brand by avoiding loss of consumer confidence and business reputation.
  • Proving due diligence and compliance to your industry regulators, customers and shareholders.
  • Non-compliance can result in your organization losing business, receiving heavy fines, gathering bad PR or ultimately failing.
  • What is tested?

  • Operating systems (Windows, Linux, Unix and Mac), applications, networking equipment.
  • Wireless (WIFI, Bluetooth etc.)
  • Personnel (screening process, social engineering etc.)
  • Physical (access controls, dumpster diving etc.).
  • Cyber Security Africa experts are certified from a wide range including CISA, CEH, and OSCP. We conform to ISECOM method of security assessment namely OSSTMM

    Copyright © 2017 Cyber Security Africa. All Rights Reserved.