Preparation
Objective setting and definition of the framework.
Contract
Mutual signing of a contract for a penetration test. This contains precise information about the objectives, deadlines and conditions.
Test phase
Implementation of the penetration test by certified staff.
Follow-up discussion
Discussion of important / critical findings. Evaluation of direct, timely measures with the IT department as well as the management.
Reporting
Written summary of findings including management summary and personal conclusion.
Retest
Re-check positively tested vulnerabilities.
Social Engineering / Phishing
Hackers' modus operandi has also changed considerably with the establishment of social networks and the increasing insecurity of users. The information that is publicly available about companies and employees - in conjunction with forged e-mails and manipulated files and USB sticks (physical access) - offers attackers a wide range of attack vectors against which current security systems do not protect.