Every day, the media relays a new story about a cybersecurity breach, ransomware attack or phishing scam costing businesses millions of dollars and hard-earned credibility. Cyber threats and criminal tactics are constantly changing, making it difficult for businesses to stay ahead.
Fortunately, there are solutions that help companies protect against threats and take action before damage can be done. Robust security software is a must for any company, but the evolving nature of cybersecurity threats calls for an extra layer of safeguards, namely vulnerability scans and penetration testing (pen tests).
What Are They?
Vulnerability Scans and Penetration Tests are proactive solutions that can help pinpoint cybersecurity problems and empower companies to take proactive steps to protect their business IT … and their bottom line.
Vulnerability Scans – Routine automated scans that search for weak points in a business’ network that could be exploited by cybercriminals. The process happens instantaneously and provides real-time insight and awareness about potential flaws and cybersecurity risks.
Penetration Test – A manual security test where technology experts attempt to hack into a business’ computer network to find vulnerabilities. The test mimics an actual hacking attempt to determine if a cybercriminal could penetrate the network and cause damage. Because pen testers have zero prior access to passwords or the company’s network, they can expose issues beyond the scope of vulnerability scans.
Vulnerability Scans vs. Penetration Testing
Feature 3219_3f230d-01> |
Vulnerability Scan 3219_2d0026-59> |
Penetration Test 3219_1f7ba9-16> |
Frequency 3219_4ca257-f3> |
Ongoing, continuous scanning 3219_4d7765-63> |
Moment in time, typically every 1 to 3 years 3219_5224ab-6e> |
Scope 3219_c6d9bb-b6> |
Scans the network for vulnerabilities 3219_5a40d8-bd> |
Deeper scan/test that attempts to trick users or break into the network by any means available 3219_119c75-34> |
Cost 3219_13c0de-9b> |
A monthly, ongoing cost, typically based on the number of IPs the company uses (e.g., $1,000/month for 200 internal IPs and 1 external IP) 3219_19e64e-0d> |
One-time fee with higher cost (e.g., $30,000+ per test) 3219_f88631-1d> |
Access Level 3219_976c30-32> |
The security solution is integrated with the company’s network, providing access to conduct ongoing scans 3219_c47487-33> |
No prior access; testers must find a way to hack into the system 3219_8dd80c-c4> |
Execution 3219_316c3d-c4> |
Can be done by MSP (managed service provider) the company already works with 3219_62cc55-ba> |
Should be done by a third-party, independent group 3219_8c02e5-ad> |
Reporting 3219_be4486-3e> |
Real-time information and alerts, quarterly reports 3219_caa484-26> |
Report after the test is completed 3219_0c57c5-7e> |
Purpose 3219_b50a32-77> |
Ongoing monitoring, real-time feedback on security issues and improvements 3219_8d5790-33> |
Deep dive audit, identifies vulnerabilities at a specific point in time 3219_9a8995-4f> |
Regulatory Status 3219_236999-88> |
Not always regulated or required, but is starting to be asked for in some compliance standards (i.e., CMMC) and insurance policies 3219_b32f95-3d> |
Typically required by auditors, especially in health care and finance 3219_c02c0e-68> |
What Should Companies Do?
Ideally, both. Penetration tests and vulnerability scans can work together to provide a robust layer of protection for businesses.
“Pen tests poke holes in your network at a specific point in time,” said Chris Miller, ATB vice president of sales and marketing. “A pen test is like a deep-dive audit, while a vulnerability scan is more like reconciling the books each month.”
In reality, many companies go three-to-five years without doing a pen test due to the expense or never conduct one at all.
“A lot can change security-wise in that time frame,” Miller said. “Ongoing vulnerability scans can help mitigate risks in between pen testing.”
Ready to strengthen your cybersecurity? At ATB Technologies, we help SMBs find and deploy cybersecurity solutions to protect against theft, damage and downtime. Our team of IT experts can help evaluate your cybersecurity posture and find solutions that make sense for you. 👉 Schedule a free consultation today at atb-tech.com/contact-us to find out more.