Identify cybersecurity threats and network vulnerabilities with our expert ethical hackers. Improve security, reduce risk, and meet industry-standard compliance.
Ethical hacking is the best way to reduce security risk from most cybersecurity attacks.
Discover weaknesses in your infrastructure that may allow for unauthorised access to sensitive data.
Find potential cybersecurity risks that could leave your organisation vulnerable to cyber attacks or identity theft.
Learn how to address critical infrastructure errors and fix the errors so that you significantly reduce your cyber risk.
Develop a risk management plan that includes an incident response system in the event of security breaches.
One of Gaia’s highly trained Security Consultants, who are in-house ethical hackers, will meet with you to discuss your current ICT system and any issues you may have.
During the simulated attacks, we use the same techniques and tactics that a real world hacker would use. The goal is to discover how resilient an organisation is and how well the current security can cope with the attacks.
With proper security testing, we can pinpoint exactly where potential hackers will target your organisation.
We use penetration testing tools to assess the security of legacy hardware, software and networks. The testing tools help discover weaknesses, anomalies, vulnerabilities and potential issues that could pose a threat to your network security.
The recommendations will include procedures and controls to implement as well as the weaknesses in your current ICT environment. Should you wish, Gaia can correct the errors and problems as part of another project.
Penetration testing is a highly technical test of the defences of your cyber systems. Gaia, as the security tester, will use all means to attempt to take control over your network.
At the end of the penetration testing, Gaia will provide you with a RAG (red, amber, green) Report. The RAG Report will provide an overall security assessment and show you the weaknesses (red), areas that need improvement (amber) and strengths (green). The security assessment will also include professional recommendations so that you can reduce your security risk right away.
Gaia’s Security Consultant will meet with you in order to scope the project. We will discuss type of the penetration testing and your choice of White Box or Black Box Testing [link below], which part of you network will be tested, and the level of engagement. Gaia will then devise the customised penetration test for your organisation and then schedule the time frame for the testing.
After a full penetration test on your cybersecurity, Gaia will produce a pen test report that includes a full list of errors and omissions found in your security system. We will also include our suggestions as to how your company can meet the required security standards.
You may wish to upgrade this service to a full Managed Security Service Provision (MSSP)
We understand that your organisation is running a business so we adhere to strict protocols that minimise the risk of interrupting your activities. We can undertake the security testing with or without warning you beforehand.
It is important to note that this penetration test is an assessment at the point in time that it was taken. This is not confirmation that vulnerabilities will not be exploited if changes to the system introduce a vulnerability to the organisation’s network. Cyber attacks change and are enhanced at a worrying pace. If your organisation’s ICT environment is ever changing you might consider one of our other Protect Consultancy Services that provides continual security monitoring.
Though we will try to break into your systems, our network penetration testing is strictly ‘White Hat Testing’. Rather than breech your security vulnerabilities maliciously, we will do so to help you fix your security weaknesses.
Our penetration testing methodology is done in a structured, formal manner with your own IT staff working alongside our staff every step of the way.
Our ethical hackers will exploit any security vulnerabilities in your system that might assist a hacker to obtain unauthorised access and undertake any type of malicious or dangerous activity.
Hackers are able to achieve network penetration through the security weaknesses in your system, which most often occur during input and output of data. Our team of ethical hackers will look at how your transmit, input and output data as well as any connectivity environments such as Cloud connectivity, internet connectivity and mobile device interfaces.
We undertake two kinds of tests:
During the penetration testing, Gaia will attend your site on multiple occasions to work on your defences from the inside out. We will do everything that the bad guys would do only to learn how to stop them in the future.