Posts Tagged ‘Test de sécurité externe’

IT threat: Managing disgruntled employees

If you are wondering what the difference is between an external and internal pen test is or what the benefits of an internal test are, this excellent article might shed some light on those question for you.

« While it’s commonplace to fear hackers, we are now being told to worry more about internal security than external; that our own people are a greater threat than outsiders. The people on the inside aren’t more hostile, they just have more access. Realistically, the vast majority of employees from your organization are well-meaning, honest people. Your company is far more likely to be a victim of an “oops” than an attack by a determined and hostile insider. An insider could access private and/or sensitive information. How do you manage a situation where a trusted insider has gone rogue? » The rest of the article here.

If you have interested in having an internal security test done on your infrastructure, email

External security test

A security test (also know as pen test) is the most effective way to test the limits of any system. This test simulates an attack from an external source, a hacker trying to penetrate the company’s network for example. The results of this test will give you a very clear vision of your systems strengths and weaknesses enabling the company to make a better judgment call regarding resource allocation to resolve the situation.


To verify the integrity of the systems in place and to recommend suitable corrective measures and or improvements.

This test consists of:

•    Examination of the IT policies and procedures

•    Systematic examinations of the company’s IT infrastructure

•    Evaluation of the network’s architecture

•    Complete analysis of the network using the OSSTMM and/or ISO 17799 methodologies

This test includes a “Vulnerability report”, which includes :

•    A fully detailed assessment of each of the vulnerabilities discovered on your systems with details and references. Each vulnerability will also be associated to a level of risk inherent to the severity of the breach.

•    Recommendations in order provide adequate and thorough solutions to the problems arising from the vulnerabilities discovered. The recommendations are adapted according to the type of network and the industry’s best practices.

•    An executive summary in layman terms.

•    Presentation and explanation of the report.

For further information, feel free to contact us

To immediately receive a detailed brochure for this service :

Your Name (required)

Your Email (required)

Your phone number

What is your current concern
about information security :