Logo 320x80 Website
Ransomare vulnerability
Cyber Security

Ransomware Vulnerability Assessment

Discover how criminals could attack your systems and data to make them inaccessible and demand a ransom of hundred of thousands, or millions. And how to prevent that from happening.

Simulating a Ransomware Attack

1 .

Phishing Test

Phishing Test

We send all employees a phishing e-mail and record responses. How difficult is it for an attacker to get an initial foothold by phishing?

2 .

External Network Test

External Network Test

Another way hackers take a first step into your networks is by finding vulnerable internet-connected services. We check how hard you’re making it for them to do this.

3 .

Workstation Test

Workstation Test

If phishing is successful, hackers often only have limited access to a single laptop. Can they break out to get more access to your network

4 .

Internal network test

Internal network test

We check the internal network for opportunities for hackers to get into more systems than they initially broke into. How hard is it to move around?

5 .

Windows Domain Test

Windows Domain Test

A crucial part of many corporate networks is the Windows Domain. If a hacker succeeds in getting Domain Administrator rights, (s)he’s almost ready to deploy ransomware. Can we make this more difficult to achieve for them?

6 .

Cloud configuration review

Cloud configuration review

We use a ”read only” account to check your Azure, Google Cloud, or AWS environment’s settings for opportunities to improve security.

7 .

Interview about back-ups

Interview about back-ups

With your IT staff, we go through the ways back-ups are made and kept. Can backups survive a ransomware attack? And how quickly can you restore your entire IT enviroment from back-up?

One Time Schedule Demo 2 Year Subscription Schedule Demo 5 Year Subscription Schedule Demo
Plans
Highest quality penetration test
Clear, understandable PDF report
Monthly followup scan
Annual repeat pentest
Free access to Insight dashboard
Free issue remediation support
One Time Schedule Demo 2 Year Subscription Schedule Demo 5 Year Subscription Schedule Demo
Plans
Highest quality penetration test
Clear, understandable PDF report
Monthly followup scan
Annual repeat pentest
Free access to Insight dashboard
Free issue remediation support
Cloud Icons

3 Months Free on Your Pen-Testing Subscription

Be prepared for potential security vulnerabilities through Securance’s Ransomware Vulnerability Assessment subscription. Our free follow-up scans will keep you up-to-date on vulnerability status and keep you in control.

Pentestingcvv

Pentesting Certificate

Securance has been certified in accordance with the Dutch national pentesting certification, the “Keurmerk Pentesten”. The CCV (Dutch national Centre for Crime Prevention and Safety) maintains this standard. We include this mark in all our security test reports. See the CCV website (Dutch) for more information.