SINOVO Color Stripe
Locale
Telefon Icon +49 6101 590 90 00 Mail Icon

Security Check 

 

Security Checks – Pentests & Dark Web Monitoring

 

Pfeil Icon

Protective measures with security checks for SMEs

Have security checks with pentests or dark web monitoring carried out instead of managing cyberattacks. The latter have long since reached small and medium-sized enterprises (SMEs). It is therefore essential to introduce the right protective measures.

For SMEs in particular, a cyber attack can mean the end, as they often do not have the financial means to combat it. You can avoid this. We'll show you how.

The security checks can take place at your premises or remotely.

enquire now

Sensible security checks depending on the use case

Fortunately, there are 2 useful security checks, depending on the use case, to protect you from cyberattacks.

  • Various pentests to detect vulnerabilities in your applications and IT infrastructure,
  • Dark Web Monitoring to find out whether your employees' login details could have ended up on the dark web.

Below you can read what exactly is behind the 2 security checks and how our experts use them to test your IT security. In the end, you can prevent serious attacks at a manageable cost. We are also happy to offer SMEs this regular check with automated tools and risk reports as a full service.

Pentests - efficiently uncover weaknesses in IT systems

Pentests are particularly efficient for SMEs when it comes to uncovering vulnerabilities in IT systems. This is because SMEs are increasingly becoming the target of hacker attacks. One of the reasons for this is that they have adopted hybrid and decentralised working models, but have not yet implemented all the important and sometimes complex solutions that are necessary to secure their decentralised employees.

Pentests are targeted, authorised attempts to penetrate IT systems to improve IT security or identify security vulnerabilities.

In simplified terms, pentests usually proceed as follows:

  • collect technical information about the IT system,
  • detect possible vulnerabilities, such as misconfigurations,
  • use vulnerabilities to check other systems for vulnerabilities,
  • write a final report to close the vulnerabilities.

Have your applications pentested

Have your applications pentested that you have developed yourself or purchased from a third-party provider.

We use web application pentests to identify security vulnerabilities in your web applications. Before we can start with web application penetration tests, we first set up the testing environment and clarify with you what exactly is to be tested.

Depending on what we have agreed on, we test your web applications for, among other things:

  • Information Leakage:
    Is it possible for an attacker to gain access to sensitive data such as system configurations, user data or even company data without prior authorisation.
  • Authentication Mechanism:
    Is it possible for an attacker to bypass login interfaces e.g. with bypass attacks and gain authorisations in the web application.
  • Input Validation:
    Is it possible for an attacker to carry out server-side or client-side attacks e.g. with cross-site scripting or SQL injections due to lack of verification of input data..

At the end, we assess the identified security gaps and recommend countermeasures. These form the basis for any further measures.

Our mobile security experts use pentests to test various mobile applications on iPhones, iPads, Android smartphones and tablets. We also test your backend application environment and the communication between the device and the backend application environment.

5 steps to more mobile security

  1. Identify common application vulnerabilities in the mobile applications. These include, for example, insecure data storage, insecure authentication or weaknesses in the communication channel used.

  2. We analyse your mobile application from the perspective of regular application users with valid test accounts. In this context, we identify vulnerabilities in the application logic as well as horizontal and vertical privilege escalations.

  3. We then analyse the backend services of your mobile application. In this section, we look specifically for security vulnerabilities in areas such as authentication, input validation, authorisation and session management as well as cryptography and message integrity.

  4. You will receive a detailed report on the vulnerabilities identified, including suggested solutions for eliminating security gaps.

  5. At the end, we support you in closing security gaps and check the effectiveness of the measures again.
  1. We subject the API interfaces defined with you in the project scope (e.g. SOAP or REST) to a comprehensive security analysis at network and application level. Using the OWASP API Security Top 10, we check your API interface for known vulnerabilities and help you to protect your API from unauthorised access.

  2. Our network-level tests include an automated vulnerability scan and a manual analysis of all network services provided by the API from the perspective of an external attacker. The application-level tests, on the other hand, are performed with a semi-manual approach and without valid user credentials.

  3. As a result of our security checks, you will receive a detailed report containing a list of all identified vulnerabilities as well as specific, prioritised recommendations on how you can improve security.

Have a pentest carried out on your IT infrastructure

A pentest of your IT infrastructure provides you with a security analysis of the effectiveness of your internal and external security systems. It does not matter whether the IT infrastructure was developed in-house or purchased from a third-party provider.

You can have the following systems checked by us with a pentest of your IT infrastructure:

01 IT INFRASTRUKTUREN security check webserver

Webserver

02 IT INFRASTRUKTUREN security check mailserver

E-Mail-server

03 IT INFRASTRUKTUREN security check Datenbank

Data bases

04 IT INFRASTRUKTUREN security check dateiserver

file Server

05 IT INFRASTRUKTUREN security check vpn gateway

VPN-Gateway

06 IT INFRASTRUKTUREN security check firewall

Firewall

07 IT INFRASTRUKTUREN security check active directory

Active Directory

08 IT INFRASTRUKTUREN security check cloud loesungen

Cloud solutions

Procedure for pentests of IT infrastructures in 5 steps

Go through the requirements and objectives of the project and jointly determine which systems are to be checked and how.

Collect information about your IT infrastructures. This information is used in the next phase to carry out attacks. By interacting with the system, further information is collected to determine possible entry points into the systems.

In this phase, the previous results are used and the IT infrastructure is specifically attacked in order to gain access to the systems. The aim is to identify, combine and assess the vulnerabilities in the IT infrastructure components. The analyses are carried out manually to find vulnerabilities that require in-depth IT security knowledge.

Parallel to the pentest, the results are recorded and analysed. The documentation includes a list of the weak points and their evaluation as well as recommendations for action.

After the pentest and the elimination of the errors, a follow-up check can take place. We check whether the vulnerabilities still exist or have been correctly rectified.

Have pentest scenarios executed

Have pentest scenarios executed. This allows you to identify the real risk potential of various attack scenarios for your company in a secure environment. Pentest scenarios include, for example, an internal attack using a compromised computer or malicious employees.

  • Malicious employees:
    Here we perform a comprehensive security analysis of a company notebook provided by you from the perspective of newly hired employees with malicious intentions.
  • Stolen notebook:
    In this pentest scenario, we examine the impact the loss of a laptop would have on your organisation..

Dark Web Monitoring

Dark Web Monitoring is a service that searches websites and forums on the dark web for your employees' personal information. This is important because hackers can steal personal data, blackmail your company or otherwise sell the data to commit various other illegal activities.

If your information is detected on the dark web, you will be notified so that you can take swift action.

 

Dark Web Monitoring Services for SMEs

We offer two dark web monitoring services for SMEs. Use our live monitoring for early detection of attacks that have already been successfully carried out. We offer you the following options and services.

Dark Net Research & Monitoring 24/7

Dark Net Research & Monitoring 24/7 is a permanent, AI-optimised monitoring and analysis of disclosed login information in real time from various sources, such as the dark web, data dumps and forums. This applies to all users of your company domain.




Monthly Dark Net Scan

The monthly Dark Net Scan is a monthly AI-optimised report on exposed credentials from various sources, such as dark web markets, data dumps and forums. The service scans all users of your company domain.

Recommendation: Focus on three key areas in dark web monitoring

In general, the recommendation for companies is to focus on three key areas in dark web monitoring.

It is advisable to identify threats from stolen login data, e.g. who is targeting your company, your brand or certain employees. The preferred tactics of hackers should also be identified.

Continuously analysing this data provides an overview of the tools used, the attackers and their motives. The information gained can in turn be used for the company's security strategy.

Stolen login data poses a significant risk that many SMEs are not aware of. Many users still use the same passwords to log in to different platforms. Hackers take advantage of credential stuffing with the help of repeated login data and gain access to websites and sensitive data. These login details are also sold on the dark web. Anyone who believes they are not affected by this trade has probably not yet looked for it.

The purchase of login data is usually used for fraud. This can include trading in credit card data, counterfeit branded goods or use for phishing campaigns. Phishing kits look deceptively like the original websites and can block certain IP addresses of well-known security companies - so that security warnings are not even received. Fraud tactics can also change and adapt over time.

Identifying fraudulent websites, products or activities early - whether on the dark or open web - can therefore make a significant contribution to data security.

Do you need help with it security checks?

Enquire now

Jonas Windgassen
Unit Manager


Telefon+49 6101 590 90 00
E-Mail Adresseinfo@sinovo.de
workplace solutions Jonas Windgassen v2 SINOVO

Dilek Imre
Head of Sales


Telefon+49 6101 590 90 00
E-Mail Adresseinfo@sinovo.de
Vertrieb Dilek Imre SINOVO