• Skip to primary navigation
  • Skip to main content
  • Skip to footer
Logo of Agilient Security Consultants, Australia

Agilient Security Consultants Australia

Cybersecurity & Risk Management Specialists

Menu
  • Home
  • Industries
      • Aviation
      • Defence & Defence Industry
      • Government
      • Health & Hospitals
      • Corrections and Detention
      • Maritime
      • Aged Care Facilities
      • Mining, Oil & Gas
      • Public Venues & Events
      • Rail
      • Research and Education Industry
      • Telecommunications
      • Utilities
    • advice-colleagues-communication-newIndustries
  • Services
      • Cybersecurity
      • Protective Security
      • Business Resilience
      • Building Security Consultants
      • Security Audits
      • Pandemic Planning
      • Electronic Security
      • IT Disaster Recovery Plan
      • Security Consultants
      • CCTV and Security Cameras
      • Duress Alarms
      • Security Risk Assessment Consultants
      • Managed Security Service Provider
      • Protection against Vehicles as a Weapon
    • training-1Services
  • Solutions
    • banner-menuUnisys Solutions
    • CTO-Blog-110619-Header-GraphicLookingGlass Solutions
    • menu-bg-2Dell Technologies (RSA) Solutions
    • Sightline-Visualization-menuSightline Solutions
  • Resources
    • menumanagers-dealing-customer-agreTraining
    • working-together-newJoin The Tribe
    • Webinars_3-1.jpgUpcoming and Past Events
    • hacking-detected-shutterstock_newResources
  • Articles
  • About
    • About Us
      We are an Australian owned and operated security company specialising in risk, cybersecurity, protective security, crisis and business continuity management services.
    • frequently-asked-questions-smallFAQ’s
    • bg-menu-government-institutionsConsultant Registration
  • Contact Us
Contact Us

Understanding Pentesting & Why It’s Important For Your Business

You are here: Home / Security News / Understanding Pentesting & Why It’s Important For Your Business

Imagine your head of IT operations turns to you, coffee in hand, and proclaims, ‘I think it’s time get a pentest done on our network!’. If your first reaction is to panic, don’t fear.
In this article, we cover some of the basic questions around pentesting and the importance of this IT process for your business and cyber security.
In short, penetration testing is the method of finding out if a network is secure by attacking it. Often shortened to pentesting, the process is a regular occurance in corporate IT and one that your business should be aware of.
Essentially, with pentesting, you’re paying good guys to do something that bad guys will do for free.

The first questions you and your business should be considering when thinking of pentesting are outlined below:

  • Is your business ready for a pentest?
  • What will happen if penetration testing is carried out within your business?
  • When it’s over, what do we get from the pentest?

Before testing begins: Are you ready?

So, you’ve been thrust into the idea of ordering a team of hoodie-clad, over-caffeinated geeks to poke holes in your network. Is that the right move?
For those starting out on the path to becoming security-aware, some initial guidance is to check out cyber security frameworks such as those provided by NIST and US-CERT.
Another good reference point ahead of testing is the ASD’s list of Risk Mitigation Strategies.
Here are some of the questions that should be considered ahead of pentesting:

  • Will your business be patching applications and operating systems?
  • Will testers be applying ‘least privilege’ policy to user accounts?
  • What is the business ‘defence in depth’ strategy?
  • What are the company’s digital assets?
  • Will the business be employing network segmentation?

The pentest process: What’s happening?

So you need to bite the bullet and order a pentest, maybe because there’s been a breach or to meet your compliance needs. But what is exactly going to happen in the process?
Once contracts are signed and arrangements have been made, pentesters will try to break into your network. But what can you expect from them and how do you know if you’re getting a good deal?

A good tester will: A bad tester will:
Find an entry point but also look for others using a thorough approach. Stop at one point of entry and begin to move through the network
Document all findings and suggest remedies or resources for remediation List some of their findings with little to no detail.
Provide a detailed, well-structured pentest report including diagrams and screenshots where applicable. The report will fully describe the vulnerabilities in a comprehensive way. Send a pentest report with minimal details, maybe a copy, paste from vulnerability scan engine if you’re lucky.

Job’s done. Or is it?

At the end of a penetration test you’ll be given a report from your vendor. This should be considered as product of the pentester’s work.

In most cases, there will be multiple issues found with your network. You and your team might spend many hours going through the report, working through ways you can beef up your network’s defences.

For assistance in securing your organisations online systems using pentesting, please do not hesitate to contact Agilient.

The Agilient Team

References:

https://www.optiv.com/blog/getting-ready-for-a-pen-test-step-3

https://www.checkpoint.com/asd-top-35-mitigation-strategies/#4

https://www.nist.gov/cyberframework

https://www.us-cert.gov/ccubedvp/cybersecurity-framework

Tweet
Share

Security News

Looking for a security partner? Get in touch with Agilient.

Looking for practical and cost-effective security and risk solutions for your government department, agency or company? Speak with Australia’s leading senior security, risk and resilience experts.


Looking for a pandemic planning partner? Get in touch with Agilient.

Looking for practical and cost-effective risk management solutions for your government department, agency or company? Speak with Australia’s leading senior risk and emergency management experts.



Footer

Agilient is a proud member of

Ai Group Defence Council
Australian Industry & Defence Network
Australian Security Industry Association
Sydney Aerospace & Defence Interest Group

Company and Licensing Details:

ABN: 37 157 911 441
NSW Security Master Licence # 410783087
ACT Security Master Licence # 17502184
Vic Security Registration # 878-460-40S
Qld Security Firm Licence # 3834422

Join The Tribe

Sign up to receive our regular Agilient newsletter including the latest security, risk and resilience updates

Sign up now

Copyright © 2022 Agilient – Level 14, 275 Alfred St, North Sydney NSW 2060 Australia – 1300 341 692