{"id":11158,"date":"2023-11-24T16:04:06","date_gmt":"2023-11-24T03:04:06","guid":{"rendered":"https:\/\/kinetics.co.nz\/?p=11158"},"modified":"2023-11-24T16:04:06","modified_gmt":"2023-11-24T03:04:06","slug":"penetration-testing","status":"publish","type":"post","link":"https:\/\/new.kinetics.co.nz\/?p=11158","title":{"rendered":"Penetration Testing"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row column_structure=&#8221;1_3,2_3&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;\/wp-content\/uploads\/2023\/11\/CloudSecurity.png&#8221; background_size=&#8221;stretch&#8221; background_blend=&#8221;hue&#8221; custom_padding=&#8221;|20px||20px|false|false&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_column][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(5,2,22,0.64)&#8221; custom_padding=&#8221;20px|20px|20px|20px|false|false&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p><span style=\"color: #ffffff;\">Penetration testing is important for businesses because it helps them identify and fix security vulnerabilities before they can be exploited by attackers.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">It can be a significant job as it needs a team of security professionals to simulate a real-world cyberattack. This can include stealing confidential data or disrupting normal business operations.\u00a0 The testing uncovers vulnerabilities that can then be closed.\u00a0 It isn&#8217;t exhaustive but it is hugely useful.<\/span><\/p>\n<h2><span style=\"color: #ffffff;\">Sometimes penetration testing is a requirement of a cyber-insurance provider before they will commit to a policy.<\/span><\/h2>\n<p><span style=\"color: #ffffff;\"><\/span><\/p>\n<h3><span style=\"color: #ffffff;\">Kinetics offers p<span class=\"ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\">enetration testing.<\/span><\/span><\/h3>\n<p><span style=\"color: #ffffff;\"><span class=\"ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\">These are highly skilled tasks.\u00a0 Based on demand,the lead times can vary,and are often 1-2 months. <\/span><\/span><\/p>\n<p><span style=\"color: #ffffff;\"><span class=\"ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\">We recommend getting them done sooner than waiting till you get a 60 days notice from your insurer.\u00a0\u00a0<\/span><\/span><\/p>\n<p><span style=\"color: #ffffff;\"><span class=\"ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\">To arrange a penetration test, we will need to quote.\u00a0 That can take a week in itself, subject to the preparatory work (for example, an initial surface scan)<\/span><\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Penetration testing is important for businesses because it helps them identify and fix security vulnerabilities before they can be exploited by attackers. It can be a significant job as it needs a team of security professionals to simulate a real-world cyberattack. This can include stealing confidential data or disrupting normal business operations.\u00a0 The testing uncovers [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":11164,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4,5],"tags":[],"class_list":["post-11158","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-security"],"_links":{"self":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/11158","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=11158"}],"version-history":[{"count":0,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/11158\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/"}],"wp:attachment":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=11158"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=11158"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=11158"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}