{"id":296,"date":"2017-01-20T16:09:59","date_gmt":"2017-01-20T12:09:59","guid":{"rendered":"http:\/\/www.awebtoknow.com\/?p=296"},"modified":"2022-02-14T11:19:46","modified_gmt":"2022-02-14T07:19:46","slug":"what-is-penetration-testing","status":"publish","type":"post","link":"https:\/\/www.awebtoknow.com\/how\/what-is-penetration-testing\/","title":{"rendered":"What Is Penetration Testing? And Why Your Business Needs It Now"},"content":{"rendered":"

Eighty-five percent of small businesses in the U. S. have been hacked. The important and sensitive information stored on their Information Technology (IT) systems has been stolen, changed, or made public. When a big company is hacked (e.g., Target, Home Depot, Sony), it’s all over the US news<\/a>, but it’s actually the smaller companies that are more at risk.<\/p>\n

Small companies tend to dismiss the threat, thinking hacking is only a problem for large corporations or the finance industry. They don’t invest enough in security for their IT systems. If they have a data security specialist on board, the person’s responsibilities include a whole range of IT duties, and he or she can’t keep up with the latest malicious code or software patches. Some companies use whatever security resources they have on damage control rather than prevention. Hackers love this. They bank on the lax security in the systems of smaller companies. The \u201cwhite hat\u201d hackers (the good guys) perform penetration testing<\/a> (\u201cpen testing\u201d) to make it difficult for the hackers to get into IT systems.<\/p>\n

\"Penetration<\/p>\n

A pen test on a computer system, network, or Web application determines where the system is vulnerable to attacks. The test team gathers information about the system, attempts to break into it, identifies the primary routes into your system that hackers can take, and compiles a report on their findings. The vulnerabilities can exist in operating systems, service and application flaws, improper configurations, and the actions of end-users. Also tested is an organization’s security policy and its ability to identify and respond to breaks in security.<\/p>\n

There are different types of pen testing. Target, external, and internal tests are on the lower end of the cost scale. They uncover weaknesses, but are limited in scope and time compared to the unlimited time (and apparently patience) that real hackers have.<\/p>\n