Penetration Test

Penetration Testing

The administration of a Penetration Test is becoming more and more critical in today's world. InfoSight will thoroughly answer the aforementioned questions and any others you have by identifying exactly where your systems are vulnerable and by testing the impact and risk associated with these vulnerabilities.

Some questions you may have for us before we begin may include:

  • How easy is it for a hacker to penetrate my network from the outside?
  • What measures and precautions are safest and most effective for the protection of our information? Which programs should we implement to best protect our assets?
  • Exactly which portals and what information is at risk?

Our Penetration Test testing process will reveal exactly how effective your organization's current security policies and precautions actually are in protecting your assets and information. We will also identify the extent to which your system can be compromised before an actual attack and best prepare you for one.

InfoSight's Penetration Testing includes:

  • Gathering information about the target before the test (reconnaissance)
  • Identifying all possible entry points, vulnerabilities, and weaknesses
  • Attempting an actual security breach (either virtually or actually)
  • Reporting back and analyzing the results and findings
Internal penetration testing, which will test the security measures put inside the perimeter firewall. It will measure the amount of information an employee or a hacker who has stolen employee credentials is able to attain. The ethical hacker will also attempt to access privileged information without user credentials to assess whether a hacker can attain this information by creating an administrator or a super user. This will determine if a user with physical access to the environment can attain privileged information.

InfoSight's Penetration Test team is built around certified cyber security professionals with a proven track record of successful testing. The penetration test also meets your regulatory compliance obligations to obtain a realistic assessment of your network. If you would like to know more about how to perform a penetration test contact us at

Complementary Services
Vulnerability Assessment
IT Risk Assessment
Social Engineering Testing and Training