{"id":762,"date":"2022-07-14T09:30:55","date_gmt":"2022-07-14T08:30:55","guid":{"rendered":"https:\/\/wordpress-704428-2734069.cloudwaysapps.com\/?page_id=762"},"modified":"2025-11-11T15:54:40","modified_gmt":"2025-11-11T15:54:40","slug":"penetration-testing","status":"publish","type":"page","link":"https:\/\/dionach.com\/en-us\/services\/assurance\/penetration-testing\/","title":{"rendered":"Penetration Testing"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"762\" class=\"elementor elementor-762\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f440708 elementor-section-full_width rows inner-page-header elementor-section-height-default elementor-section-height-default\" data-id=\"f440708\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-d24026a\" data-id=\"d24026a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ae43ef1 bg-text premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"ae43ef1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class=\"premium-title-container style1\">\r\n\t\t\t<h1 class=\"premium-title-header premium-title-style1\">\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\r\n\t\t\t\t\tPenetration Testing\t\t\t\t<\/span>\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t<\/h1>\r\n\r\n\t\t<\/div>\r\n\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ec86c8 big-text premium-header-inline premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"3ec86c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">Identify, Evaluate, <\/span><span class=\"premium-dual-header-second-header \">Remediate<\/span><\/h2> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d609c08 elementor-widget elementor-widget-button\" data-id=\"d609c08\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.dionach.com\/get-a-free-consultation\/\" id=\"get-a-quote\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get a Free Consultation<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5258277\" data-id=\"5258277\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a21de44 p-margin elementor-widget elementor-widget-text-editor\" data-id=\"a21de44\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Regular penetration testing, sometimes known as ethical hacking, is a mainstay of security evaluation programmes with the goal of mitigating cyber risk.<\/p><p>Faced with the triple challenge of rising cyber threats, mounting public interest in data safeguarding and tough new regulations, organizations are taking no chances when it comes to testing &#8211; and demonstrating &#8211; their resilience to attacks.<\/p><p>Identifying your organization&#8217;s vulnerabilities by using techniques employed by real-world cyber criminals will set you on the right course to accurately evaluating risk and, where necessary, choosing the right remedial solutions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-ef75711 elementor-hidden-mobile e-flex e-con-boxed e-con e-parent\" data-id=\"ef75711\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6fa8c3c premium-header-inline premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"6fa8c3c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">Reliable and Accredited <\/span><span class=\"premium-dual-header-second-header \">Penetration Testing<\/span><\/h2> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-96ecc62 e-grid e-con-boxed e-con e-child\" data-id=\"96ecc62\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f248ac1 elementor-hidden-tablet elementor-widget elementor-widget-image\" data-id=\"f248ac1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/05\/white-background-image.png?fit=500%2C500&amp;ssl=1\" class=\"attachment-large size-large wp-image-20496\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/05\/white-background-image.png?w=500&amp;ssl=1 500w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/05\/white-background-image.png?resize=300%2C300&amp;ssl=1 300w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/05\/white-background-image.png?resize=150%2C150&amp;ssl=1 150w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e97f791 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"e97f791\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.crest-approved.org\/member_companies\/dionach-ltd\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"212\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/04\/crest-logo-1.png?fit=300%2C212&amp;ssl=1\" class=\"elementor-animation-grow attachment-medium size-medium wp-image-16184\" alt=\"Crest logo\" srcset=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/04\/crest-logo-1.png?w=2048&amp;ssl=1 2048w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/04\/crest-logo-1.png?resize=300%2C212&amp;ssl=1 300w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/04\/crest-logo-1.png?resize=1024%2C724&amp;ssl=1 1024w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/04\/crest-logo-1.png?resize=768%2C543&amp;ssl=1 768w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/04\/crest-logo-1.png?resize=1536%2C1086&amp;ssl=1 1536w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41d468b elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget elementor-widget-image\" data-id=\"41d468b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.crest-approved.org\/member_companies\/dionach-ltd\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"425\" height=\"393\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/04\/penetration_testing.webp?fit=425%2C393&amp;ssl=1\" class=\"elementor-animation-grow attachment-medium_large size-medium_large wp-image-19869\" alt=\"pen test logo\" srcset=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/04\/penetration_testing.webp?w=425&amp;ssl=1 425w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/04\/penetration_testing.webp?resize=300%2C277&amp;ssl=1 300w\" sizes=\"(max-width: 425px) 100vw, 425px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-09a9a34 elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget elementor-widget-image\" data-id=\"09a9a34\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.crest-approved.org\/member_companies\/dionach-ltd\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"425\" height=\"393\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/04\/37838_Crest-icons_2022_STPT-1.png?fit=425%2C393&amp;ssl=1\" class=\"elementor-animation-grow attachment-medium_large size-medium_large wp-image-16190\" alt=\"Star intelligence led-pt logo\" srcset=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/04\/37838_Crest-icons_2022_STPT-1.png?w=425&amp;ssl=1 425w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/04\/37838_Crest-icons_2022_STPT-1.png?resize=300%2C277&amp;ssl=1 300w\" sizes=\"(max-width: 425px) 100vw, 425px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aa2a3fc elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget elementor-widget-image\" data-id=\"aa2a3fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.crest-approved.org\/member_companies\/dionach-ltd\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/05\/images-1.png?resize=150%2C150&amp;ssl=1\" class=\"elementor-animation-grow attachment-thumbnail size-thumbnail wp-image-20151\" alt=\"star-fs logo\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-02c9674 elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget elementor-widget-image\" data-id=\"02c9674\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.crest-approved.org\/member_companies\/dionach-ltd\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"277\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/04\/37838_Crest-icons_2022_CSIR.png?fit=300%2C277&amp;ssl=1\" class=\"elementor-animation-grow attachment-medium size-medium wp-image-19875\" alt=\"CSIR logo\" srcset=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/04\/37838_Crest-icons_2022_CSIR.png?w=425&amp;ssl=1 425w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/04\/37838_Crest-icons_2022_CSIR.png?resize=300%2C277&amp;ssl=1 300w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-56c627f elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"56c627f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ncsc.gov.uk\/organisation\/dionach\/check-penetration-testing\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"735\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/04\/CHECK-Penetration-Testing-1.png?fit=1024%2C735&amp;ssl=1\" class=\"elementor-animation-grow attachment-large size-large wp-image-16181\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/04\/CHECK-Penetration-Testing-1.png?w=1137&amp;ssl=1 1137w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/04\/CHECK-Penetration-Testing-1.png?resize=300%2C215&amp;ssl=1 300w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/04\/CHECK-Penetration-Testing-1.png?resize=1024%2C735&amp;ssl=1 1024w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/04\/CHECK-Penetration-Testing-1.png?resize=768%2C551&amp;ssl=1 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74d6444 elementor-hidden-tablet elementor-widget elementor-widget-image\" data-id=\"74d6444\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/05\/white-background-image.png?fit=500%2C500&amp;ssl=1\" class=\"attachment-large size-large wp-image-20496\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/05\/white-background-image.png?w=500&amp;ssl=1 500w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/05\/white-background-image.png?resize=300%2C300&amp;ssl=1 300w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/05\/white-background-image.png?resize=150%2C150&amp;ssl=1 150w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dffe55f elementor-hidden-tablet elementor-widget elementor-widget-image\" data-id=\"dffe55f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/05\/white-background-image.png?fit=500%2C500&amp;ssl=1\" class=\"attachment-large size-large wp-image-20496\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/05\/white-background-image.png?w=500&amp;ssl=1 500w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/05\/white-background-image.png?resize=300%2C300&amp;ssl=1 300w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/05\/white-background-image.png?resize=150%2C150&amp;ssl=1 150w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-111d817 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"111d817\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/04\/300x300-ISO-9001.png?fit=300%2C300&amp;ssl=1\" class=\"elementor-animation-grow attachment-medium size-medium wp-image-19890\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/04\/300x300-ISO-9001.png?w=300&amp;ssl=1 300w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/04\/300x300-ISO-9001.png?resize=150%2C150&amp;ssl=1 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ee2df6 elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget elementor-widget-image\" data-id=\"7ee2df6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/02\/1721746898380.jpg?fit=800%2C800&amp;ssl=1\" class=\"elementor-animation-grow attachment-1536x1536 size-1536x1536 wp-image-19246\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/02\/1721746898380.jpg?w=800&amp;ssl=1 800w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/02\/1721746898380.jpg?resize=300%2C300&amp;ssl=1 300w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/02\/1721746898380.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/02\/1721746898380.jpg?resize=768%2C768&amp;ssl=1 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1497e6f elementor-widget elementor-widget-image\" data-id=\"1497e6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"122\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/04\/mmm.png?fit=300%2C122&amp;ssl=1\" class=\"elementor-animation-grow attachment-medium size-medium wp-image-16178\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/04\/mmm.png?w=392&amp;ssl=1 392w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/04\/mmm.png?resize=300%2C122&amp;ssl=1 300w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b3e2b9b elementor-widget elementor-widget-image\" data-id=\"b3e2b9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.crest-approved.org\/member_companies\/dionach-ltd\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"79\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/04\/ASSURE-2.png?fit=300%2C79&amp;ssl=1\" class=\"elementor-animation-grow attachment-medium size-medium wp-image-19881\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/04\/ASSURE-2.png?w=540&amp;ssl=1 540w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/04\/ASSURE-2.png?resize=300%2C79&amp;ssl=1 300w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29e4551 elementor-widget elementor-widget-image\" data-id=\"29e4551\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.pcisecuritystandards.org\/assessors_and_solutions\/qualified_security_assessors\/?search=dionach\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"296\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/04\/QSA-Image-for-Blog-Post-1-1080x579-1.jpg?fit=300%2C296&amp;ssl=1\" class=\"elementor-animation-grow attachment-medium size-medium wp-image-19857\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/04\/QSA-Image-for-Blog-Post-1-1080x579-1.jpg?w=586&amp;ssl=1 586w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/04\/QSA-Image-for-Blog-Post-1-1080x579-1.jpg?resize=300%2C296&amp;ssl=1 300w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-96bbee1 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"96bbee1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"123\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/04\/pngwing.com_-1.png?fit=300%2C123&amp;ssl=1\" class=\"elementor-animation-grow attachment-medium size-medium wp-image-16175\" alt=\"crown commercial service logo\" srcset=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/04\/pngwing.com_-1.png?w=800&amp;ssl=1 800w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/04\/pngwing.com_-1.png?resize=300%2C123&amp;ssl=1 300w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/04\/pngwing.com_-1.png?resize=768%2C316&amp;ssl=1 768w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e1266cb elementor-hidden-tablet elementor-widget elementor-widget-image\" data-id=\"e1266cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/05\/white-background-image.png?fit=500%2C500&amp;ssl=1\" class=\"attachment-large size-large wp-image-20496\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/05\/white-background-image.png?w=500&amp;ssl=1 500w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/05\/white-background-image.png?resize=300%2C300&amp;ssl=1 300w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/05\/white-background-image.png?resize=150%2C150&amp;ssl=1 150w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e260eb5 e-flex e-con-boxed e-con e-parent\" data-id=\"e260eb5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-96ccb91 e-con-full e-flex e-con e-child\" data-id=\"96ccb91\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eaa5c73 elementor-widget elementor-widget-heading\" data-id=\"eaa5c73\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Are Your Systems Truly Secure?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f8dfeb0 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"f8dfeb0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Penetration testing is vital for safeguarding your organization&#8217;s systems and networks against cyber threats. By simulating real-world attacks, it identifies vulnerabilities and weaknesses that malicious actors could exploit.<\/p><p>\u00a0<\/p><p>As cyber threats continue to evolve, regular penetration testing ensures your defenses are robust, helping to protect sensitive data, maintain compliance, and reduce risk. Stay proactive in securing your organization&#8217;s digital assets with targeted vulnerability assessments and actionable insights.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e1be91e e-con-full e-flex e-con e-child\" data-id=\"e1be91e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-08f6222 elementor-hidden-mobile elementor-widget elementor-widget-image\" data-id=\"08f6222\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"768\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2023\/04\/%E2%80%94Pngtree%E2%80%94data-abstraction-light-effect-line_6860892.png?fit=768%2C768&amp;ssl=1\" class=\"attachment-medium_large size-medium_large wp-image-12757\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-296737d elementor-section-full_width four-cols rows elementor-section-height-default elementor-section-height-default\" data-id=\"296737d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bdd50fb\" data-id=\"bdd50fb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7a18940 bg-text premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"7a18940\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class=\"premium-title-container style1\">\r\n\t\t\t<h2 class=\"premium-title-header premium-title-style1\">\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\r\n\t\t\t\t\tTypes of Penetration Testing\t\t\t\t<\/span>\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t<\/h2>\r\n\r\n\t\t<\/div>\r\n\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-077085f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"077085f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-30a080e\" data-id=\"30a080e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-962f634 elementor-widget elementor-widget-image\" data-id=\"962f634\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2023\/04\/Your-paragraph-text-150-%C3%97-150px-15-1.png?fit=100%2C100&#038;ssl=1\" title=\"Your-paragraph-text-150-\u00d7-150px-15.png\" alt=\"Your-paragraph-text-150-\u00d7-150px-15.png\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f8e0b9 big-text premium-header-inline premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"6f8e0b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">Internal Penetration Test <\/span><\/h2> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6866d52 p-margin elementor-widget elementor-widget-text-editor\" data-id=\"6866d52\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This assesses the threat of both deliberate and accidental breaches from hackers and malicious or negligent insiders with access to your systems. Often deemed low-risk, internal attacks can actually pose a substantial threat to an organization.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-30696a6\" data-id=\"30696a6\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b24319d elementor-widget elementor-widget-image\" data-id=\"b24319d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2023\/04\/Your-paragraph-text-150-%C3%97-150px-5-1.png?fit=100%2C100&#038;ssl=1\" title=\"Your-paragraph-text-150-\u00d7-150px-5.png\" alt=\"Your-paragraph-text-150-\u00d7-150px-5.png\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd8a8c9 big-text premium-header-inline premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"cd8a8c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">External Network Penetration Test <\/span><\/h2> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-32b0a89 p-margin elementor-widget elementor-widget-text-editor\" data-id=\"32b0a89\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>External network penetration testing is a type of penetration testing that focuses on evaluating the security of a network infrastructure. This test identifies the vulnerabilities of your computer systems through their exposure to the Internet.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3738979 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3738979\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f8a591f\" data-id=\"f8a591f\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b13d52 elementor-widget elementor-widget-image\" data-id=\"5b13d52\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2023\/04\/Your-paragraph-text-150-%C3%97-150px-6-1.png?fit=100%2C100&#038;ssl=1\" title=\"Your-paragraph-text-150-\u00d7-150px-6.png\" alt=\"Your-paragraph-text-150-\u00d7-150px-6.png\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ea39b09 big-text elementor-widget__width-initial premium-header-inline premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"ea39b09\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">Web Application Penetration Test <\/span><\/h2> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1fac9f5 p-margin elementor-widget elementor-widget-text-editor\" data-id=\"1fac9f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A web application penetration test is a type of security assessment that involves identifying and exploiting vulnerabilities in web-based applications. The correct choice of test if you wish to ensure that your websites, webshops, intranets, extranets and web-based applications are secure.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-091d01f\" data-id=\"091d01f\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7d0cbcd elementor-widget elementor-widget-image\" data-id=\"7d0cbcd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2023\/04\/Your-paragraph-text-150-%C3%97-150px-10-1.png?fit=100%2C100&#038;ssl=1\" title=\"Your-paragraph-text-150-\u00d7-150px-10.png\" alt=\"Your-paragraph-text-150-\u00d7-150px-10.png\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f10ea30 big-text premium-header-inline premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"f10ea30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">Mobile Application Penetration Test <\/span><\/h2> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c4c3789 p-margin elementor-widget elementor-widget-text-editor\" data-id=\"c4c3789\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A mobile application penetration test is an assessment of security that aims to identify and exploit vulnerabilities found in mobile applications. The primary goal of this testing is to assess the security posture of a mobile application and to identify vulnerabilities that could be exploited by attackers to gain unauthorized access to sensitive data or systems. We would recommend this test to evaluate your mobile apps and the web services that they communicate with.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-75c0f18 e-flex e-con-boxed e-con e-parent\" data-id=\"75c0f18\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_mouse&quot;:&quot;yes&quot;,&quot;background_motion_fx_mouseTrack_effect&quot;:&quot;yes&quot;,&quot;background_motion_fx_mouseTrack_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1,&quot;sizes&quot;:[]}}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7a6345a e-con-full e-flex e-con e-child\" data-id=\"7a6345a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-7f2c2ee e-con-full e-flex e-con e-child\" data-id=\"7f2c2ee\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-29a9aa5 e-con-full e-flex e-con e-child\" data-id=\"29a9aa5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5625f80 premium-header-block elementor-widget-mobile__width-initial premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"5625f80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">Need help with cyber security solutions? <\/span><span class=\"premium-dual-header-second-header \">We are experts!<\/span><\/h2> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7733241 e-con-full e-flex e-con e-child\" data-id=\"7733241\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c46c57c elementor-align-center elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"c46c57c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/www.dionach.com\/en-us\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-87474bf e-flex e-con-boxed e-con e-parent\" data-id=\"87474bf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-35ec6aa bg-text premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"35ec6aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class=\"premium-title-container style1\">\r\n\t\t\t<h2 class=\"premium-title-header premium-title-style1\">\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\r\n\t\t\t\t\tPenetration Testing Phases\t\t\t\t<\/span>\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t<\/h2>\r\n\r\n\t\t<\/div>\r\n\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-25e2b89 e-flex e-con-boxed e-con e-parent\" data-id=\"25e2b89\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d0cf9a5 elementor-widget elementor-widget-toggle\" data-id=\"d0cf9a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2181\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-2181\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">1. Planning and Scoping<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2181\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-2181\"><p>The penetration testing team and the client work together to define the scope and objectives of the testing. This involves identifying the systems, applications, and networks to be tested, as well as the testing methods and tools to be used.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2182\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-2182\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">2. Reconnaissance<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2182\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-2182\"><p>The penetration testing team gathers information about the target system or network, including IP addresses, open ports, operating systems, and applications. This information is typically gathered through passive or active reconnaissance techniques.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2183\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-2183\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">3. Vulnerability Scanning<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2183\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-2183\"><p>The team uses vulnerability scanning tools to identify known vulnerabilities in the target system or network. This step helps the tester to understand the level of risk associated with each vulnerability.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2184\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-2184\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">4. Exploitation<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2184\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-2184\"><p>The team attempts to exploit the identified vulnerabilities in the target system or network. This involves using various attack techniques to gain access to the system or network, such as SQL injection,\u00a0<span class=\"ui-provider gp b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\">weak authentication<\/span>, or brute-force attacks.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2185\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-2185\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">5. Post-exploitation<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2185\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-2185\"><p>Once the team has gained access to the target system or network, they attempt to escalate privileges, install backdoors, or access sensitive data. This step is critical in determining the overall security posture of the target system or network.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2186\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-2186\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">6. Reporting<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2186\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-2186\"><p>The penetration testing team documents the findings and recommendations from the testing exercise. This includes a detailed report on the vulnerabilities identified, the methods used to exploit them, and recommendations for remediation.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-760f95d elementor-section-full_width rows typical-row elementor-section-height-default elementor-section-height-default\" data-id=\"760f95d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-01b1ad8\" data-id=\"01b1ad8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2192d3c bg-text premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"2192d3c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class=\"premium-title-container style1\">\r\n\t\t\t<h2 class=\"premium-title-header premium-title-style1\">\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\r\n\t\t\t\t\tWhy Conduct Regular Penetration Testing?\t\t\t\t<\/span>\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t<\/h2>\r\n\r\n\t\t<\/div>\r\n\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2fe4526 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2fe4526\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-afa40b3\" data-id=\"afa40b3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a8e87c5 lists-here elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"a8e87c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Understand and mitigate risk to protect your organization\u2019s information.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Demonstrate your resilience to the Board, stakeholders, customers and regulators.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Highlight any serious weaknesses and take action before an attacker exploits them.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-b0bf556\" data-id=\"b0bf556\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b5c0855 lists-here elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"b5c0855\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Meet compliance obligations.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Make informed decisions about security spend.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Improve attack detection rates and tighten up your incident response procedures.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5edd0b5 elementor-section-content-middle elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5edd0b5\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-8830419\" data-id=\"8830419\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d1ebf60 elementor-widget elementor-widget-heading\" data-id=\"d1ebf60\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Explore Our Related Blog Posts<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-15a6349\" data-id=\"15a6349\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5dd1f33 e-con-full e-flex e-con e-child\" data-id=\"5dd1f33\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-78de406 elementor-posts--thumbnail-none elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-card-shadow-yes elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"78de406\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;cards_columns&quot;:&quot;3&quot;,&quot;cards_columns_tablet&quot;:&quot;2&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-7426 post type-post status-publish format-standard has-post-thumbnail hentry category-researchblog wpbf-post\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/dionach.com\/en-us\/simple-2fa-moodle-plugin\/\" target=&quot;_blank&quot;>\n\t\t\t\tSimple 2FA Moodle Plugin: From 2FA Bypass to Account Takeover\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/dionach.com\/en-us\/simple-2fa-moodle-plugin\/\" aria-label=\"Read more about Simple 2FA Moodle Plugin: From 2FA Bypass to Account Takeover\" tabindex=\"-1\" target=\"_blank\">\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-15376 project type-project status-publish has-post-thumbnail hentry wpbf-post\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/dionach.com\/en-us\/project\/why-a-red-team-exercise-delivers-results\/\" target=&quot;_blank&quot;>\n\t\t\t\tWhy A Red Team Exercise Delivers Results\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/dionach.com\/en-us\/project\/why-a-red-team-exercise-delivers-results\/\" aria-label=\"Read more about Why A Red Team Exercise Delivers Results\" tabindex=\"-1\" target=\"_blank\">\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-2883 post type-post status-publish format-standard has-post-thumbnail hentry category-researchblog tag-infrastructure tag-mobile_apps tag-red_team tag-web_applications wpbf-post\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/dionach.com\/en-us\/risk-based-application-penetration-testing\/\" target=&quot;_blank&quot;>\n\t\t\t\tRisk based Application Penetration Testing\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/dionach.com\/en-us\/risk-based-application-penetration-testing\/\" aria-label=\"Read more about Risk based Application Penetration Testing\" tabindex=\"-1\" target=\"_blank\">\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-2826 post type-post status-publish format-standard has-post-thumbnail hentry category-researchblog tag-infrastructure wpbf-post\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/dionach.com\/en-us\/an-effective-internal-penetration-test\/\" target=&quot;_blank&quot;>\n\t\t\t\tAn Effective Internal Penetration Test\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/dionach.com\/en-us\/an-effective-internal-penetration-test\/\" aria-label=\"Read more about An Effective Internal Penetration Test\" tabindex=\"-1\" target=\"_blank\">\n\t\t\tRead More \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-94f1279 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"94f1279\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e1f143c\" data-id=\"e1f143c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6a52d43 bg-text premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"6a52d43\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class=\"premium-title-container style1\">\r\n\t\t\t<h2 class=\"premium-title-header premium-title-style1\">\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\r\n\t\t\t\t\t<h1 style=\"text-transform: uppercase;letter-spacing: -1px;white-space: normal;color: white !important\">PENETRATION TEST FREQUENTLY ASKED QUESTIONS<\/h1>\t\t\t\t<\/span>\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t<\/h2>\r\n\r\n\t\t<\/div>\r\n\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b5c5fa7 elementor-widget elementor-widget-text-editor\" data-id=\"b5c5fa7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We have documented frequently asked questions about our penetration test services. If you cannot find the answer to your questions, please do get in touch directly. We\u2019ll be happy to help.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-3b9a07f e-flex e-con-boxed e-con e-parent\" data-id=\"3b9a07f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-72dbfe7 e-con-full e-flex e-con e-child\" data-id=\"72dbfe7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e704ed5 elementor-widget elementor-widget-accordion\" data-id=\"e704ed5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2421\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-2421\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\"> What is a penetration test?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2421\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-2421\"><p>A penetration test is an assurance service where the actions of a malicious attacker are simulated to test the effectiveness of security controls on networks, applications, devices, and services. The aim of a penetration test is to identify as many vulnerabilities as possible on a given scope. Although a variety of tools are used, at Dionach penetration testing is predominantly a manual exercise using the skills of the qualified penetration tester.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2422\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-2422\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What is the difference between a penetration test and a vulnerability scan?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2422\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-2422\"><p>A vulnerability scan is an automated series of tests that look for vulnerabilities within a given scope, producing a report of any known vulnerabilities it finds, with templated recommendations. Although a very useful exercise, vulnerability scanners are prone to flagging false positives and false negatives. They typically only rely on a database of known vulnerabilities, and do not attempt to chain vulnerabilities together. For example, the combination of a number of lower risk vulnerabilities used in combination could lead to a critical risk issue, which the vulnerability scanner would not highlight.<\/p><p>\u00a0<\/p><p>A penetration test on the other hand may use a series of automated tools initially to find any known vulnerabilities, however the skills of the individual penetration tester are the driving force behind the exercise. The tester will verify the results of any scans they perform, eliminating false positives. They will look to find proof of concepts of any discovered vulnerabilities. They will also use human intelligence and a systematic methodology to manually explore and exploit any discovered vulnerabilities. This would include combining vulnerabilities, exploring business logic, and applying their knowledge and experience.<\/p><p>\u00a0<\/p><p>Ideally, vulnerability scanning, and penetration testing should complement each other. It is relatively inexpensive to run regular vulnerability scans against your networks and applications in order to highlight any new known vulnerabilities. However, penetration testing should still then be done periodically, and with any significant changes to the scope.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2423\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-2423\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What qualifications should I look for from a penetration testing company?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2423\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-2423\"><p>Organizations that provide penetration testing services should possess both company and individual qualifications related to penetration testing, supported by organizations such as <a href=\"https:\/\/www.crest-approved.org\/\">CREST<\/a> and <a href=\"https:\/\/www.ncsc.gov.uk\/information\/check-penetration-testing\">CHECK<\/a>.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2424\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-2424\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Will the penetration test be conducted remotely or onsite?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2424\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-2424\"><p>That depends upon the situation and your specific requirements. Many penetration testing engagements can be conducted remotely via the Internet, whether that be by direct access, or via VPN or VM\/device shipped to your network. Remote testing does have the advantage of reducing travel costs and expenses. In some circumstances however, it may not be possible, or desirable to provide remote access to the environment, so an onsite visit may be required. Additionally, some of our clients prefer our testers to complete some or all testing onsite, so they can more easily interact during the process. Options will be discussed during the scoping exercise to find the best solution for your project.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2425\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-2425\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What tools are used on a penetration test?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2425\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-2425\"><p>A variety of in-house developed and publicly available tools are used throughout the penetration test. These include various scanners, open-source intelligence (OSINT) tools, vulnerability scanners, web application scanning tools, HTTP proxies, exploits and scripts customized for the application or network. These tools are continually reviewed and updated by our security specialists to ensure we are always one step ahead of the constantly evolving threats. The most important part of a penetration test however is always the manual testing process, where the qualified consultant selects the relevant tools for each circumstance, or potential vulnerability.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2426\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-2426\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What is the difference between and black box, grey box and white box test?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2426\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-2426\"><p>These refer to different contexts that a penetration test engagement can be approach.<\/p><ul><li>-Black Box<\/li><li>This is where testing of a system or network is undertaken with no prior knowledge of its internal workings. From an assurance perspective, this means that testing is done without credentials or access to system documentation or source code.<\/li><li>-Grey Box<\/li><li>This is where testing of a system or network is undertaken with limited knowledge. From an assurance perspective, this means that login credentials may be provided to the system, but these may be limited to non-administrator level. Also, limited or no documentation would be available.<\/li><li>-White box:<\/li><li>This is testing of a system of network with full access to the entire system or network\u2019s internal workings. This would typically include the tester having access to login credentials, design documents, source code, and stakeholder input.<\/li><li>\u00a0<\/li><\/ul><p>Each of these approaches has their benefit, when it comes to gaining assurance of the security of your systems, depending upon the aims of the test. Dionach\u2019s consultant will walk through the best testing approach for your specific project during the scoping phase.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2427\" class=\"elementor-tab-title\" data-tab=\"7\" role=\"button\" aria-controls=\"elementor-tab-content-2427\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Why should I whitelist the penetration tester on my WAF \/ IPS?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2427\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"region\" aria-labelledby=\"elementor-tab-title-2427\"><p>On a typical penetration test, you will be asked to whitelist the penetration tester and their source IP addresses on any Web Application Firewall (WAF) or Intrusion Prevention System (IPS). This may feel counter intuitive, when you are looking to gain assurance of the security of your system. However, this is a common and practical means of getting the most out of your test. One thing a real attacker has is time. They can very slowly and patiently chip away at your system under the radar over a very long period of time, evading WAFs and IPS. A penetration tester has a fixed amount of time to find as many vulnerabilities as possible. As soon as a penetration tester starts a scan it is likely that they will be blocked, meaning they would have to work very slowly to avoid detection, increasing the time (and cost) needed for the engagement. Whitelisting the WAF\/IPS allows the penetration tester to more easily find and highlight as many vulnerabilities as possible, that can then be risk assessed and remediated. The WAF\/IPS then provides an additional layer of protection over the top of an assured secure system.<\/p><p>There are situations where there may be a requirement to test the efficacy of a WAF \/ IPS, and there are many techniques that can be used to do this. For example, doing the initial test with WAF\/IPS off, to find as many vulnerabilities as possible, then doing an exercise afterwards to see how easily any serious issues could be exploited with the WAF\/IPS on. During the scoping exercise, we ensure that we fully understand the requirements, and ensure we recommend the most method of testing suitable type of testing.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2428\" class=\"elementor-tab-title\" data-tab=\"8\" role=\"button\" aria-controls=\"elementor-tab-content-2428\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What is the lead time for a penetration test?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2428\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"8\" role=\"region\" aria-labelledby=\"elementor-tab-title-2428\"><p>Although all penetration testing companies will try and accommodate your requirement for penetration testing at the earliest opportunity, penetration testing services are in high demand, especially at certain times of the year. Our advice is to plan your penetration testing requirements in advance as much as possible to make sure you have time reserved for when you need it. At Dionach we will always ensure we match your service to the most appropriate consultant at the earliest availability. If an opportunity arises to move scheduled work to an earlier date, due to changes in availability, or cancellations, we will contact you.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2429\" class=\"elementor-tab-title\" data-tab=\"9\" role=\"button\" aria-controls=\"elementor-tab-content-2429\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What if a critical risk issue is found?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2429\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"9\" role=\"region\" aria-labelledby=\"elementor-tab-title-2429\"><p>If during the course of a penetration test, a serious issue is discovered that poses a significant risk to the system or network, Dionach will contact you as soon as the vulnerability is confirmed. At this point, knowledge transfer is key, and the consultant will be available to go over the detail of the vulnerability, and make recommendations for remediation, or mitigation.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-24210\" class=\"elementor-tab-title\" data-tab=\"10\" role=\"button\" aria-controls=\"elementor-tab-content-24210\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What will be in my report?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-24210\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"10\" role=\"region\" aria-labelledby=\"elementor-tab-title-24210\"><p>At the conclusion of the penetration test, the tester puts together a detailed report of the findings of the test. The first part of the report is an executive summary which is an easily digestible summary of the findings, business implications and strategic recommendations. This is easily readable for technical and non-technical people and is useful when trying to get across the business implications of the findings.<\/p><p>The second part of the report is a detailed description of all highlighted issues, along with CVSS scores where appropriate, assessment of impact, likelihood of exploitation, and overall risk rating. Practical guidance and recommendations are made for each issue, within the context of the scope tested. These recommendations are manually constructed and are bespoke to your specific environment. The consultant is always available to discuss any of the issues once you have read the report, to ensure the full value is gained from the test.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<script type=\"application\/ld+json\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\"What is a penetration test?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>A penetration test is an assurance service where the actions of a malicious attacker are simulated to test the effectiveness of security controls on networks, applications, devices, and services. The aim of a penetration test is to identify as many vulnerabilities as possible on a given scope. Although a variety of tools are used, at Dionach penetration testing is predominantly a manual exercise using the skills of the qualified penetration tester.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"What is the difference between a penetration test and a vulnerability scan?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>A vulnerability scan is an automated series of tests that look for vulnerabilities within a given scope, producing a report of any known vulnerabilities it finds, with templated recommendations. Although a very useful exercise, vulnerability scanners are prone to flagging false positives and false negatives. They typically only rely on a database of known vulnerabilities, and do not attempt to chain vulnerabilities together. For example, the combination of a number of lower risk vulnerabilities used in combination could lead to a critical risk issue, which the vulnerability scanner would not highlight.<\\\/p><p>\\u00a0<\\\/p><p>A penetration test on the other hand may use a series of automated tools initially to find any known vulnerabilities, however the skills of the individual penetration tester are the driving force behind the exercise. The tester will verify the results of any scans they perform, eliminating false positives. They will look to find proof of concepts of any discovered vulnerabilities. They will also use human intelligence and a systematic methodology to manually explore and exploit any discovered vulnerabilities. This would include combining vulnerabilities, exploring business logic, and applying their knowledge and experience.<\\\/p><p>\\u00a0<\\\/p><p>Ideally, vulnerability scanning, and penetration testing should complement each other. It is relatively inexpensive to run regular vulnerability scans against your networks and applications in order to highlight any new known vulnerabilities. However, penetration testing should still then be done periodically, and with any significant changes to the scope.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"What qualifications should I look for from a penetration testing company?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Organizations that provide penetration testing services should possess both company and individual qualifications related to penetration testing, supported by organizations such as <a href=\\\"https:\\\/\\\/www.crest-approved.org\\\/\\\">CREST<\\\/a> and <a href=\\\"https:\\\/\\\/www.ncsc.gov.uk\\\/information\\\/check-penetration-testing\\\">CHECK<\\\/a>.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"Will the penetration test be conducted remotely or onsite?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>That depends upon the situation and your specific requirements. Many penetration testing engagements can be conducted remotely via the Internet, whether that be by direct access, or via VPN or VM\\\/device shipped to your network. Remote testing does have the advantage of reducing travel costs and expenses. In some circumstances however, it may not be possible, or desirable to provide remote access to the environment, so an onsite visit may be required. Additionally, some of our clients prefer our testers to complete some or all testing onsite, so they can more easily interact during the process. Options will be discussed during the scoping exercise to find the best solution for your project.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"What tools are used on a penetration test?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>A variety of in-house developed and publicly available tools are used throughout the penetration test. These include various scanners, open-source intelligence (OSINT) tools, vulnerability scanners, web application scanning tools, HTTP proxies, exploits and scripts customized for the application or network. These tools are continually reviewed and updated by our security specialists to ensure we are always one step ahead of the constantly evolving threats. The most important part of a penetration test however is always the manual testing process, where the qualified consultant selects the relevant tools for each circumstance, or potential vulnerability.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"What is the difference between and black box, grey box and white box test?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>These refer to different contexts that a penetration test engagement can be approach.<\\\/p><ul><li>-Black Box<\\\/li><li>This is where testing of a system or network is undertaken with no prior knowledge of its internal workings. From an assurance perspective, this means that testing is done without credentials or access to system documentation or source code.<\\\/li><li>-Grey Box<\\\/li><li>This is where testing of a system or network is undertaken with limited knowledge. From an assurance perspective, this means that login credentials may be provided to the system, but these may be limited to non-administrator level. Also, limited or no documentation would be available.<\\\/li><li>-White box:<\\\/li><li>This is testing of a system of network with full access to the entire system or network\\u2019s internal workings. This would typically include the tester having access to login credentials, design documents, source code, and stakeholder input.<\\\/li><li>\\u00a0<\\\/li><\\\/ul><p>Each of these approaches has their benefit, when it comes to gaining assurance of the security of your systems, depending upon the aims of the test. Dionach\\u2019s consultant will walk through the best testing approach for your specific project during the scoping phase.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"Why should I whitelist the penetration tester on my WAF \\\/ IPS?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>On a typical penetration test, you will be asked to whitelist the penetration tester and their source IP addresses on any Web Application Firewall (WAF) or Intrusion Prevention System (IPS). This may feel counter intuitive, when you are looking to gain assurance of the security of your system. However, this is a common and practical means of getting the most out of your test. One thing a real attacker has is time. They can very slowly and patiently chip away at your system under the radar over a very long period of time, evading WAFs and IPS. A penetration tester has a fixed amount of time to find as many vulnerabilities as possible. As soon as a penetration tester starts a scan it is likely that they will be blocked, meaning they would have to work very slowly to avoid detection, increasing the time (and cost) needed for the engagement. Whitelisting the WAF\\\/IPS allows the penetration tester to more easily find and highlight as many vulnerabilities as possible, that can then be risk assessed and remediated. The WAF\\\/IPS then provides an additional layer of protection over the top of an assured secure system.<\\\/p><p>There are situations where there may be a requirement to test the efficacy of a WAF \\\/ IPS, and there are many techniques that can be used to do this. For example, doing the initial test with WAF\\\/IPS off, to find as many vulnerabilities as possible, then doing an exercise afterwards to see how easily any serious issues could be exploited with the WAF\\\/IPS on. During the scoping exercise, we ensure that we fully understand the requirements, and ensure we recommend the most method of testing suitable type of testing.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"What is the lead time for a penetration test?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Although all penetration testing companies will try and accommodate your requirement for penetration testing at the earliest opportunity, penetration testing services are in high demand, especially at certain times of the year. Our advice is to plan your penetration testing requirements in advance as much as possible to make sure you have time reserved for when you need it. At Dionach we will always ensure we match your service to the most appropriate consultant at the earliest availability. If an opportunity arises to move scheduled work to an earlier date, due to changes in availability, or cancellations, we will contact you.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"What if a critical risk issue is found?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>If during the course of a penetration test, a serious issue is discovered that poses a significant risk to the system or network, Dionach will contact you as soon as the vulnerability is confirmed. At this point, knowledge transfer is key, and the consultant will be available to go over the detail of the vulnerability, and make recommendations for remediation, or mitigation.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"What will be in my report?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>At the conclusion of the penetration test, the tester puts together a detailed report of the findings of the test. The first part of the report is an executive summary which is an easily digestible summary of the findings, business implications and strategic recommendations. This is easily readable for technical and non-technical people and is useful when trying to get across the business implications of the findings.<\\\/p><p>The second part of the report is a detailed description of all highlighted issues, along with CVSS scores where appropriate, assessment of impact, likelihood of exploitation, and overall risk rating. Practical guidance and recommendations are made for each issue, within the context of the scope tested. These recommendations are manually constructed and are bespoke to your specific environment. The consultant is always available to discuss any of the issues once you have read the report, to ensure the full value is gained from the test.<\\\/p>\"}}]}<\/script>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0ea3233 e-con-full e-flex e-con e-child\" data-id=\"0ea3233\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-926bfaf elementor-widget elementor-widget-accordion\" data-id=\"926bfaf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1531\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1531\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">How long does a penetration test take?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1531\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1531\"><p>That\u2019s a difficult question to answer as it purely comes down to the scope of the exercise. A small scope of a network with very few exposed services, or a simple brochure website with limited functionality may be 3 days or even less. Larger, more complex applications or large networks may take significantly longer. A larger testing requirement of multiple applications and networks may take a number of weeks. As part of the scoping process, Dionach will ensure they fully understand what the scope of your test is, and what you are looking to achieve through the test, taking into account your budget, so that the optimum number of days is allocated.<\/p><p>One thing to note, is that although a specific number of days may be quoted for your test, this relates to the overall accumulation of time used, rather than a consecutive number of days. For example, a 5-day test could take place over a 2-week period, depending on the nature of the network or application. Any specific timeline requirements or deadlines within your project should be highlighted at the point of scoping \/ scheduling to ensure we can plan around those.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1532\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1532\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Should I test my live environment, or a UAT or test environment?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1532\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1532\"><p>Every situation is potentially different, and there can be reasons to do either of these options. Testing on a live environment is very common, and very rarely causes any issues. It is probably the most common approach to penetration testing. Some organizations may be wary of exposing their live application, and there are a number of methods that can be taken in this case. This includes replicating the live environment in a test environment to carry out the testing, but then verifying the issues on the live site. Also, specific tests could be carried out on either the live or test environment, e.g., application testing on test, and network testing on the live supporting network. During the scoping process, Dionach can explore the best option that fits in with your environment.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1533\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1533\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Do I need to get permission for penetration testing?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1533\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1533\"><p>If your websites or networks are hosted by a third party, then permission from that provider will be required prior to testing. The requirements for this vary between hosting companies, with some companies allowing testing without approval on certain services, and others needing detailed forms to be filled in in advance. In anticipation of a penetration test, it is advised that the requirements around permissions for any services that are hosted by a third party be checked in advance, as without permission, the penetration could be delayed.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1534\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1534\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">How will I know it is the penetration tester, rather than a real attacker that is targeting my network?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1534\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1534\"><p>At the point of scheduling, a window of testing will be established, so you are aware when we are carrying out the test. This will include the days we have allocated to testing, and also a number of days post testing where any issues discovered may need to be verified by our Quality Assurance process. Past that, Dionach\u2019s consultants conduct all their testing from a fixed set of IP addresses, which we will supply to you prior to the commencement of the test. All activity logged from those IP addresses will be us. However, if at any time during the test there are any concerns, the consultant will be available to verify anything or ask questions.<\/p><p>It is good practice during a penetration test to review your logs to ensure you do detect or are alerted to the activity of the penetration test. A penetration test generates many logs, and it is good to ensure that you are alerted in some way to our activity.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1535\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-1535\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Why do I need to take backups prior to penetration testing?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1535\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-1535\"><p>It is important to ensure that regular backups are in place and effective on all systems included in the scope of testing. This is best practice. It is incredibly rare that there are any adverse effects penetration testing on an environment, and Dionach take every precaution to ensure that the integrity and availability of our client\u2019s network or system is not compromised in any way. Dionach conduct thousands of penetration tests per year without incident. However, it is never possible to give a 100% guarantee in any situation, and having backups is purely a precaution. We would however expect no adverse effects to be experienced, and the DDI of the tester is available to contact them immediately if anything untoward is noted.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1536\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-1536\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">How often should I do a penetration test?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1536\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-1536\"><p>Best practice is that penetration testing of systems and networks is conducted at least annually, and also whenever there are any significant changes.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1537\" class=\"elementor-tab-title\" data-tab=\"7\" role=\"button\" aria-controls=\"elementor-tab-content-1537\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">How do I go about a retest?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1537\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"region\" aria-labelledby=\"elementor-tab-title-1537\"><p>There are a number of options for retesting the results of a penetration test, and Dionach will work with you to find the best option. Some clients like to have a full repeat of the original test, after attempting to remediate the highlighted issues. Sometimes, the key issues, maybe critical and high-risk issues would be tested only. At the end of the test, the tester can help to give guidance on their recommendations for retesting, to ensure you get the most out of the exercise.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1538\" class=\"elementor-tab-title\" data-tab=\"8\" role=\"button\" aria-controls=\"elementor-tab-content-1538\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Can I get a certificate to say my website is secure?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1538\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"8\" role=\"region\" aria-labelledby=\"elementor-tab-title-1538\"><p>A penetration test is a point in time assessment, and therefore it isn\u2019t normally appropriate to issue a certificate relating to the website. However, a statement of works can be provided giving an overview of the penetration testing that has taken place, that can be shared with interested parties.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1539\" class=\"elementor-tab-title\" data-tab=\"9\" role=\"button\" aria-controls=\"elementor-tab-content-1539\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">How can I share the results with clients, without disclosing sensitive detail?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1539\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"9\" role=\"region\" aria-labelledby=\"elementor-tab-title-1539\"><p>Although the final penetration test report has a great amount of detail relating to findings from the penetration test, it may not always be desirable to share the full detail with interested parties. In these circumstances, a high-level summary report can be produced, giving an overview of what was tested, and the types of vulnerabilities and risk levels that were find, without revealing sensitive details. This is then more safely shared with stakeholders.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<script type=\"application\/ld+json\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\"How long does a penetration test take?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>That\\u2019s a difficult question to answer as it purely comes down to the scope of the exercise. A small scope of a network with very few exposed services, or a simple brochure website with limited functionality may be 3 days or even less. Larger, more complex applications or large networks may take significantly longer. A larger testing requirement of multiple applications and networks may take a number of weeks. As part of the scoping process, Dionach will ensure they fully understand what the scope of your test is, and what you are looking to achieve through the test, taking into account your budget, so that the optimum number of days is allocated.<\\\/p><p>One thing to note, is that although a specific number of days may be quoted for your test, this relates to the overall accumulation of time used, rather than a consecutive number of days. For example, a 5-day test could take place over a 2-week period, depending on the nature of the network or application. Any specific timeline requirements or deadlines within your project should be highlighted at the point of scoping \\\/ scheduling to ensure we can plan around those.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"Should I test my live environment, or a UAT or test environment?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Every situation is potentially different, and there can be reasons to do either of these options. Testing on a live environment is very common, and very rarely causes any issues. It is probably the most common approach to penetration testing. Some organizations may be wary of exposing their live application, and there are a number of methods that can be taken in this case. This includes replicating the live environment in a test environment to carry out the testing, but then verifying the issues on the live site. Also, specific tests could be carried out on either the live or test environment, e.g., application testing on test, and network testing on the live supporting network. During the scoping process, Dionach can explore the best option that fits in with your environment.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"Do I need to get permission for penetration testing?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>If your websites or networks are hosted by a third party, then permission from that provider will be required prior to testing. The requirements for this vary between hosting companies, with some companies allowing testing without approval on certain services, and others needing detailed forms to be filled in in advance. In anticipation of a penetration test, it is advised that the requirements around permissions for any services that are hosted by a third party be checked in advance, as without permission, the penetration could be delayed.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"How will I know it is the penetration tester, rather than a real attacker that is targeting my network?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>At the point of scheduling, a window of testing will be established, so you are aware when we are carrying out the test. This will include the days we have allocated to testing, and also a number of days post testing where any issues discovered may need to be verified by our Quality Assurance process. Past that, Dionach\\u2019s consultants conduct all their testing from a fixed set of IP addresses, which we will supply to you prior to the commencement of the test. All activity logged from those IP addresses will be us. However, if at any time during the test there are any concerns, the consultant will be available to verify anything or ask questions.<\\\/p><p>It is good practice during a penetration test to review your logs to ensure you do detect or are alerted to the activity of the penetration test. A penetration test generates many logs, and it is good to ensure that you are alerted in some way to our activity.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"Why do I need to take backups prior to penetration testing?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>It is important to ensure that regular backups are in place and effective on all systems included in the scope of testing. This is best practice. It is incredibly rare that there are any adverse effects penetration testing on an environment, and Dionach take every precaution to ensure that the integrity and availability of our client\\u2019s network or system is not compromised in any way. Dionach conduct thousands of penetration tests per year without incident. However, it is never possible to give a 100% guarantee in any situation, and having backups is purely a precaution. We would however expect no adverse effects to be experienced, and the DDI of the tester is available to contact them immediately if anything untoward is noted.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"How often should I do a penetration test?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Best practice is that penetration testing of systems and networks is conducted at least annually, and also whenever there are any significant changes.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"How do I go about a retest?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>There are a number of options for retesting the results of a penetration test, and Dionach will work with you to find the best option. Some clients like to have a full repeat of the original test, after attempting to remediate the highlighted issues. Sometimes, the key issues, maybe critical and high-risk issues would be tested only. At the end of the test, the tester can help to give guidance on their recommendations for retesting, to ensure you get the most out of the exercise.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"Can I get a certificate to say my website is secure?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>A penetration test is a point in time assessment, and therefore it isn\\u2019t normally appropriate to issue a certificate relating to the website. However, a statement of works can be provided giving an overview of the penetration testing that has taken place, that can be shared with interested parties.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"How can I share the results with clients, without disclosing sensitive detail?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Although the final penetration test report has a great amount of detail relating to findings from the penetration test, it may not always be desirable to share the full detail with interested parties. In these circumstances, a high-level summary report can be produced, giving an overview of what was tested, and the types of vulnerabilities and risk levels that were find, without revealing sensitive details. This is then more safely shared with stakeholders.<\\\/p>\"}}]}<\/script>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-13d32ca elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"13d32ca\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_mouse&quot;:&quot;yes&quot;,&quot;background_motion_fx_mouseTrack_effect&quot;:&quot;yes&quot;,&quot;background_motion_fx_mouseTrack_direction&quot;:&quot;negative&quot;,&quot;background_motion_fx_mouseTrack_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0.1,&quot;sizes&quot;:[]}}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7878360\" data-id=\"7878360\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3abc54a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3abc54a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-547bfa2\" data-id=\"547bfa2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-14335af big-text premium-header-inline premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"14335af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">How are Dionach positioned to help <\/span><span class=\"premium-dual-header-second-header \">Your Organization?<\/span><\/h2> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dc9eaf3 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"dc9eaf3\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Dionach is a trusted cyber security partner with expertise in penetration testing. We help organizations identify vulnerabilities, assess risks, and enhance security posture. Our tailored testing services ensure your systems, applications, and networks are safeguarded against potential threats while meeting compliance requirements. With proven methodologies and detailed reporting, Dionach empowers your organization to stay resilient in an evolving threat landscape.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a45749a elementor-widget elementor-widget-button\" data-id=\"a45749a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.dionach.com\/get-a-free-consultation\/\" id=\"get-a-quote\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get a Free Consultation<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3eb883e elementor-hidden-mobile\" data-id=\"3eb883e\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d84b027 elementor-widget__width-auto animated-slow elementor-widget elementor-widget-image\" data-id=\"d84b027\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;,&quot;_animation_delay&quot;:500}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1148\" height=\"2048\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/06\/AdobeStock_1352942382-1.jpeg?fit=1148%2C2048&amp;ssl=1\" class=\"attachment-full size-full wp-image-21838\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/06\/AdobeStock_1352942382-1.jpeg?w=1148&amp;ssl=1 1148w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/06\/AdobeStock_1352942382-1.jpeg?resize=168%2C300&amp;ssl=1 168w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/06\/AdobeStock_1352942382-1.jpeg?resize=574%2C1024&amp;ssl=1 574w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/06\/AdobeStock_1352942382-1.jpeg?resize=768%2C1370&amp;ssl=1 768w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/06\/AdobeStock_1352942382-1.jpeg?resize=861%2C1536&amp;ssl=1 861w\" sizes=\"(max-width: 1148px) 100vw, 1148px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-82aeb1b elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"82aeb1b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8b52e9f\" data-id=\"8b52e9f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2d4ade4 bg-text premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"2d4ade4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class=\"premium-title-container style1\">\r\n\t\t\t<h2 class=\"premium-title-header premium-title-style1\">\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\r\n\t\t\t\t\tHow  We Work\t\t\t\t<\/span>\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t<\/h2>\r\n\r\n\t\t<\/div>\r\n\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ad1de21 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default\" data-id=\"ad1de21\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-4400938\" data-id=\"4400938\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cc7ffe4 elementor-widget elementor-widget-image\" data-id=\"cc7ffe4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"799\" height=\"799\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2023\/02\/code.jpg?fit=799%2C799&amp;ssl=1\" class=\"attachment-large size-large wp-image-11933\" alt=\"Computer on a table\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-19ec712 arrow-left\" data-id=\"19ec712\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0ad7e1b elementor-widget elementor-widget-text-editor\" data-id=\"0ad7e1b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We deliver the whole spectrum of cyber security services, from long-term, enterprise wide strategy and implementation projects to single penetration tests.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-e9d3119\" data-id=\"e9d3119\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a76bcd0 elementor-widget elementor-widget-image\" data-id=\"a76bcd0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"799\" height=\"799\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2023\/02\/Team.jpg?fit=799%2C799&amp;ssl=1\" class=\"attachment-large size-large wp-image-11936\" alt=\"Teamwork\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-324836f left-arrow\" data-id=\"324836f\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b914805 elementor-widget elementor-widget-text-editor\" data-id=\"b914805\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our team works with you to identify and assess your organization&#8217;s vulnerabilities, de\ufb01ne enterprise-wide goals, and advise how best to achieve them.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3e32d76 elementor-section-height-min-height elementor-hidden-mobile elementor-section-boxed elementor-section-height-default\" data-id=\"3e32d76\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-d9f6b0b right-arrow\" data-id=\"d9f6b0b\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a0b3828 elementor-widget elementor-widget-text-editor\" data-id=\"a0b3828\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our recommendations are clear, concise, pragmatic and tailored to your organization.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-7eda220\" data-id=\"7eda220\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-66401b7 elementor-widget elementor-widget-image\" data-id=\"66401b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"799\" height=\"799\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2023\/02\/Recommendations.jpg?fit=799%2C799&amp;ssl=1\" class=\"attachment-large size-large wp-image-11939\" alt=\"Writing data\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-7084c4d right-arrow\" data-id=\"7084c4d\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-60f39ee elementor-widget elementor-widget-text-editor\" data-id=\"60f39ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Independent, unbiased, personalized \u2013 this is how we define our services. We guide you to spend wisely and invest in change efficiently.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-ed499df\" data-id=\"ed499df\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4da68f8 elementor-widget elementor-widget-image\" data-id=\"4da68f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"799\" height=\"799\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2023\/02\/Planning.jpg?fit=799%2C799&amp;ssl=1\" class=\"attachment-large size-large wp-image-11850\" alt=\"A man typing on a keyboard while engaging in a discussion with others, indicating collaboration or teamwork\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4cced1d elementor-section-height-min-height elementor-hidden-desktop elementor-hidden-tablet elementor-section-boxed elementor-section-height-default\" data-id=\"4cced1d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-54daa2a\" data-id=\"54daa2a\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c82bdfa elementor-widget elementor-widget-image\" data-id=\"c82bdfa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"799\" height=\"799\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2023\/06\/Recommendations.jpg?fit=799%2C799&amp;ssl=1\" class=\"attachment-large size-large wp-image-13423\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-bb26444 right-arrow\" data-id=\"bb26444\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0c0bacf elementor-widget elementor-widget-text-editor\" data-id=\"0c0bacf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our recommendations are clear, concise, pragmatic and tailored to your organization.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-be31f61\" data-id=\"be31f61\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2ca7813 elementor-widget elementor-widget-image\" data-id=\"2ca7813\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"715\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/03\/AdobeStock_268764135.jpeg?fit=1024%2C715&amp;ssl=1\" class=\"attachment-large size-large wp-image-19412\" alt=\"A hand click a security logo\" srcset=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/03\/AdobeStock_268764135.jpeg?w=2048&amp;ssl=1 2048w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/03\/AdobeStock_268764135.jpeg?resize=300%2C209&amp;ssl=1 300w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/03\/AdobeStock_268764135.jpeg?resize=1024%2C715&amp;ssl=1 1024w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/03\/AdobeStock_268764135.jpeg?resize=768%2C536&amp;ssl=1 768w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/03\/AdobeStock_268764135.jpeg?resize=1536%2C1073&amp;ssl=1 1536w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-ba95925 right-arrow\" data-id=\"ba95925\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a692126 elementor-widget elementor-widget-text-editor\" data-id=\"a692126\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Independent, unbiased, personalized \u2013 this is how we define our services. We guide you to spend wisely and invest in change efficiently.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-713a395 elementor-section-full_width rows inner-page-header elementor-section-height-default elementor-section-height-default\" data-id=\"713a395\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-faf9580\" data-id=\"faf9580\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b6453c7 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"b6453c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"640\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2023\/04\/Planning.jpg?fit=768%2C640&amp;ssl=1\" class=\"attachment-medium_large size-medium_large wp-image-12860\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2023\/04\/Planning.jpg?w=959&amp;ssl=1 959w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2023\/04\/Planning.jpg?resize=300%2C250&amp;ssl=1 300w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2023\/04\/Planning.jpg?resize=768%2C640&amp;ssl=1 768w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2023\/04\/Planning.jpg?resize=480%2C400&amp;ssl=1 480w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c3f6bf1 elementor-widget elementor-widget-heading\" data-id=\"c3f6bf1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Follow us<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-279da8a elementor-shape-circle e-grid-align-left e-grid-align-mobile-center elementor-grid-0 elementor-widget elementor-widget-social-icons\" data-id=\"279da8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"social-icons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-social-icons-wrapper elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-facebook-f elementor-repeater-item-fd3385c\" href=\"https:\/\/www.facebook.com\/dionachcyber\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Facebook-f<\/span>\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-facebook-f\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M279.14 288l14.22-92.66h-88.91v-60.13c0-25.35 12.42-50.06 52.24-50.06h40.42V6.26S260.43 0 225.36 0c-73.22 0-121.08 44.38-121.08 124.72v70.62H22.89V288h81.39v224h100.17V288z\"><\/path><\/svg>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-x-twitter elementor-repeater-item-a99030d\" href=\"https:\/\/twitter.com\/dionachcyber\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">X-twitter<\/span>\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-x-twitter\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M389.2 48h70.6L305.6 224.2 487 464H345L233.7 318.6 106.5 464H35.8L200.7 275.5 26.8 48H172.4L272.9 180.9 389.2 48zM364.4 421.8h39.1L151.1 88h-42L364.4 421.8z\"><\/path><\/svg>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-instagram elementor-repeater-item-d9d5df1\" href=\"https:\/\/www.instagram.com\/dionachcyber\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Instagram<\/span>\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-instagram\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.1 141c-63.6 0-114.9 51.3-114.9 114.9s51.3 114.9 114.9 114.9S339 319.5 339 255.9 287.7 141 224.1 141zm0 189.6c-41.1 0-74.7-33.5-74.7-74.7s33.5-74.7 74.7-74.7 74.7 33.5 74.7 74.7-33.6 74.7-74.7 74.7zm146.4-194.3c0 14.9-12 26.8-26.8 26.8-14.9 0-26.8-12-26.8-26.8s12-26.8 26.8-26.8 26.8 12 26.8 26.8zm76.1 27.2c-1.7-35.9-9.9-67.7-36.2-93.9-26.2-26.2-58-34.4-93.9-36.2-37-2.1-147.9-2.1-184.9 0-35.8 1.7-67.6 9.9-93.9 36.1s-34.4 58-36.2 93.9c-2.1 37-2.1 147.9 0 184.9 1.7 35.9 9.9 67.7 36.2 93.9s58 34.4 93.9 36.2c37 2.1 147.9 2.1 184.9 0 35.9-1.7 67.7-9.9 93.9-36.2 26.2-26.2 34.4-58 36.2-93.9 2.1-37 2.1-147.8 0-184.8zM398.8 388c-7.8 19.6-22.9 34.7-42.6 42.6-29.5 11.7-99.5 9-132.1 9s-102.7 2.6-132.1-9c-19.6-7.8-34.7-22.9-42.6-42.6-11.7-29.5-9-99.5-9-132.1s-2.6-102.7 9-132.1c7.8-19.6 22.9-34.7 42.6-42.6 29.5-11.7 99.5-9 132.1-9s102.7-2.6 132.1 9c19.6 7.8 34.7 22.9 42.6 42.6 11.7 29.5 9 99.5 9 132.1s2.7 102.7-9 132.1z\"><\/path><\/svg>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-linkedin-in elementor-repeater-item-1939e61\" href=\"https:\/\/www.linkedin.com\/company\/dionach-ltd\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Linkedin-in<\/span>\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-linkedin-in\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M100.28 448H7.4V148.9h92.88zM53.79 108.1C24.09 108.1 0 83.5 0 53.8a53.79 53.79 0 0 1 107.58 0c0 29.7-24.1 54.3-53.79 54.3zM447.9 448h-92.68V302.4c0-34.7-.7-79.2-48.29-79.2-48.29 0-55.69 37.7-55.69 76.7V448h-92.78V148.9h89.08v40.8h1.3c12.4-23.5 42.69-48.3 87.88-48.3 94 0 111.28 61.9 111.28 142.3V448z\"><\/path><\/svg>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-679c9d0\" data-id=\"679c9d0\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-818932f big-text elementor-widget__width-initial premium-header-inline premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"818932f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">Let\u2019s Explore How We Can Support Your <\/span><span class=\"premium-dual-header-second-header \">Cybersecurity Journey<\/span><\/h2> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9136166 globalContactForm elementor-widget elementor-widget-global elementor-global-16582 elementor-widget-html\" data-id=\"9136166\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script data-jetpack-boost=\"ignore\" charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js-eu1.hsforms.net\/forms\/embed\/v2.js\"><\/script>\r\n<script data-jetpack-boost=\"ignore\">\r\n    hbspt.forms.create({\r\n        region: \"eu1\",\r\n        portalId: \"144019468\",\r\n        formId: \"e250b989-c434-47dc-baef-10d3692477df\"\r\n});\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f3ed789 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f3ed789\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1091567\" data-id=\"1091567\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-67ed3f5 bg-text premium-title-color elementor-widget elementor-widget-premium-addon-title\" data-id=\"67ed3f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class=\"premium-title-container style1\">\r\n\t\t\t<h2 class=\"premium-title-header premium-title-style1\">\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"premium-title-text\">\r\n\t\t\t\t\tDiscover Our Latest Research\t\t\t\t<\/span>\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t<\/h2>\r\n\r\n\t\t<\/div>\r\n\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ac9057 elementor-widget elementor-widget-lae-portfolio\" data-id=\"2ac9057\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;per_line&quot;:&quot;3&quot;,&quot;per_line_tablet&quot;:&quot;2&quot;,&quot;per_line_mobile&quot;:&quot;1&quot;}\" data-widget_type=\"lae-portfolio.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"lae-portfolio-wrap lae-gapless-grid\"><div id=\"lae-portfolio-69cb86910a1db\" class=\"lae-portfolio js-isotope lae-fitRows lae-grid-container lae-classic-skin lae-grid-desktop-3 lae-grid-tablet-2 lae-grid-mobile-1\" data-isotope-options='{ \"itemSelector\": \".lae-portfolio-item\", \"layoutMode\": \"fitRows\", \"originLeft\": true}'><div data-id=\"id-27478\" class=\"lae-grid-item lae-portfolio-item  term-1\"><article id=\"post-27478\" class=\"post-27478 post type-post status-publish format-standard has-post-thumbnail hentry category-researchblog wpbf-post\"><div class=\"lae-project-image\"><a href=\"https:\/\/dionach.com\/en-us\/ai-security-the-operational-reality\/\"\u030c\u030c><img width=\"768\" height=\"512\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2026\/03\/AdobeStock_1499266834.jpeg?fit=768%2C512&amp;ssl=1\" class=\"lae-image skip-lazy no-lazyload exclude-me a3-notlazy attachment-medium_large size-medium_large\" alt=\"AdobeStock_1499266834\" title=\"AdobeStock_1499266834\" data-no-lazy=\"1\" loading=\"eager\" decoding=\"sync\" srcset=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2026\/03\/AdobeStock_1499266834.jpeg?w=2048&amp;ssl=1 2048w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2026\/03\/AdobeStock_1499266834.jpeg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2026\/03\/AdobeStock_1499266834.jpeg?resize=1024%2C683&amp;ssl=1 1024w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2026\/03\/AdobeStock_1499266834.jpeg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2026\/03\/AdobeStock_1499266834.jpeg?resize=1536%2C1024&amp;ssl=1 1536w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/a><div class=\"lae-entry-text-wrap \"><h3 class=\"entry-title\"><a href=\"https:\/\/dionach.com\/en-us\/ai-security-the-operational-reality\/\" title=\"AI Security: The Operational Reality\u00a0\u00a0\" rel=\"bookmark\">AI Security: The Operational Reality\u00a0\u00a0<\/a><\/h3><div class=\"entry-summary\">A technical deep dive into real-world vulnerabilities exposed by AI. The biggest risk to your AI deployment is not superintelligence; it is a logic error.<\/div><div class=\"lae-read-more\"><a href=\"https:\/\/dionach.com\/en-us\/ai-security-the-operational-reality\/\">Read More<\/a><\/div><\/div><\/article><!-- .hentry --><\/div><div data-id=\"id-25750\" class=\"lae-grid-item lae-portfolio-item  term-1\"><article id=\"post-25750\" class=\"post-25750 post type-post status-publish format-standard has-post-thumbnail hentry category-researchblog tag-compliance tag-dspt wpbf-post\"><div class=\"lae-project-image\"><a href=\"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2025-2026-caf\/\"\u030c\u030c><img width=\"768\" height=\"431\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/12\/AdobeStock_1697727222.jpeg?fit=768%2C431&amp;ssl=1\" class=\"lae-image skip-lazy no-lazyload exclude-me a3-notlazy attachment-medium_large size-medium_large\" alt=\"AdobeStock_1697727222\" title=\"Data Security and Protection Toolkit (DSPT) 2025\/2026 CAF\" data-no-lazy=\"1\" loading=\"eager\" decoding=\"sync\" srcset=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/12\/AdobeStock_1697727222.jpeg?w=2048&amp;ssl=1 2048w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/12\/AdobeStock_1697727222.jpeg?resize=300%2C168&amp;ssl=1 300w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/12\/AdobeStock_1697727222.jpeg?resize=1024%2C575&amp;ssl=1 1024w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/12\/AdobeStock_1697727222.jpeg?resize=768%2C431&amp;ssl=1 768w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/12\/AdobeStock_1697727222.jpeg?resize=1536%2C862&amp;ssl=1 1536w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/a><div class=\"lae-entry-text-wrap \"><h3 class=\"entry-title\"><a href=\"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2025-2026-caf\/\" title=\"Data Security and Protection Toolkit (DSPT) 2025\/2026 CAF\" rel=\"bookmark\">Data Security and Protection Toolkit (DSPT) 2025\/2026 CAF<\/a><\/h3><div class=\"entry-summary\">The new DSPT for 2025\/2026 is now more closely aligned to the NCSC Cyber Assessment Framework (CAF). This means more outcome-based auditing, focused on how<\/div><div class=\"lae-read-more\"><a href=\"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2025-2026-caf\/\">Read More<\/a><\/div><\/div><\/article><!-- .hentry --><\/div><div data-id=\"id-25736\" class=\"lae-grid-item lae-portfolio-item  term-1\"><article id=\"post-25736\" class=\"post-25736 post type-post status-publish format-standard has-post-thumbnail hentry category-researchblog wpbf-post\"><div class=\"lae-project-image\"><a href=\"https:\/\/dionach.com\/en-us\/penetration-testing-for-iso-27001-certification\/\"\u030c\u030c><img width=\"768\" height=\"421\" src=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_534361448.jpeg?fit=768%2C421&amp;ssl=1\" class=\"lae-image skip-lazy no-lazyload exclude-me a3-notlazy attachment-medium_large size-medium_large\" alt=\"ISO 27001\" title=\"ISO 27001\" data-no-lazy=\"1\" loading=\"eager\" decoding=\"sync\" srcset=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_534361448.jpeg?w=2048&amp;ssl=1 2048w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_534361448.jpeg?resize=300%2C165&amp;ssl=1 300w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_534361448.jpeg?resize=1024%2C562&amp;ssl=1 1024w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_534361448.jpeg?resize=768%2C421&amp;ssl=1 768w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_534361448.jpeg?resize=1536%2C842&amp;ssl=1 1536w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/a><div class=\"lae-entry-text-wrap \"><h3 class=\"entry-title\"><a href=\"https:\/\/dionach.com\/en-us\/penetration-testing-for-iso-27001-certification\/\" title=\"From Policy to Practice: Penetration Testing for ISO 27001\" rel=\"bookmark\">From Policy to Practice: Penetration Testing for ISO 27001<\/a><\/h3><div class=\"entry-summary\">ISO 27001:2022 is the international standard for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS). While the standard does not explicitly<\/div><div class=\"lae-read-more\"><a href=\"https:\/\/dionach.com\/en-us\/penetration-testing-for-iso-27001-certification\/\">Read More<\/a><\/div><\/div><\/article><!-- .hentry --><\/div><\/div><!-- .lae-portfolio --><\/div><!-- .lae-portfolio-wrap -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Penetration Testing Identify, Evaluate, Remediate Get a Free Consultation Regular penetration testing, sometimes known as ethical hacking, is a mainstay of security evaluation programmes with<\/p>\n","protected":false},"author":12,"featured_media":22409,"parent":740,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"content-type":"","footnotes":""},"class_list":["post-762","page","type-page","status-publish","has-post-thumbnail","hentry","wpbf-post"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Dionach - Penetration Testing Services | CREST-Certified<\/title>\n<meta name=\"description\" content=\"Uncover and fix security weaknesses with expert penetration testing. Dionach simulates real attacks to protect your systems and data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dionach.com\/en-us\/services\/assurance\/penetration-testing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dionach - Penetration Testing Services | CREST-Certified\" \/>\n<meta property=\"og:description\" content=\"Uncover and fix security weaknesses with expert penetration testing. Dionach simulates real attacks to protect your systems and data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dionach.com\/en-us\/services\/assurance\/penetration-testing\/\" \/>\n<meta property=\"og:site_name\" content=\"Dionach\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dionachcyber\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-11T15:54:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/06\/AdobeStock_594313160-1.jpeg?fit=2048%2C1365&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1365\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"21 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dionach.com\/en-us\/services\/assurance\/penetration-testing\/\",\"url\":\"https:\/\/dionach.com\/en-us\/services\/assurance\/penetration-testing\/\",\"name\":\"Dionach - Penetration Testing Services | CREST-Certified\",\"isPartOf\":{\"@id\":\"https:\/\/dionach.com\/en-us\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dionach.com\/en-us\/services\/assurance\/penetration-testing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dionach.com\/en-us\/services\/assurance\/penetration-testing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/06\/AdobeStock_594313160-1.jpeg?fit=2048%2C1365&ssl=1\",\"datePublished\":\"2022-07-14T08:30:55+00:00\",\"dateModified\":\"2025-11-11T15:54:40+00:00\",\"description\":\"Uncover and fix security weaknesses with expert penetration testing. Dionach simulates real attacks to protect your systems and data.\",\"breadcrumb\":{\"@id\":\"https:\/\/dionach.com\/en-us\/services\/assurance\/penetration-testing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dionach.com\/en-us\/services\/assurance\/penetration-testing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dionach.com\/en-us\/services\/assurance\/penetration-testing\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/06\/AdobeStock_594313160-1.jpeg?fit=2048%2C1365&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/06\/AdobeStock_594313160-1.jpeg?fit=2048%2C1365&ssl=1\",\"width\":2048,\"height\":1365},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dionach.com\/en-us\/services\/assurance\/penetration-testing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dionach.com\/en-us\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\/\/dionach.com\/en-us\/services\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Assurance\",\"item\":\"https:\/\/dionach.com\/en-us\/services\/assurance\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Penetration Testing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dionach.com\/en-us\/#website\",\"url\":\"https:\/\/dionach.com\/en-us\/\",\"name\":\"Dionach\",\"description\":\"Real Security in a Virtual World\",\"publisher\":{\"@id\":\"https:\/\/dionach.com\/en-us\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dionach.com\/en-us\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dionach.com\/en-us\/#organization\",\"name\":\"Dionach\",\"url\":\"https:\/\/dionach.com\/en-us\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dionach.com\/en-us\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"contentUrl\":\"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"width\":512,\"height\":512,\"caption\":\"Dionach\"},\"image\":{\"@id\":\"https:\/\/dionach.com\/en-us\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/dionachcyber\",\"https:\/\/x.com\/dionachcyber\",\"https:\/\/uk.linkedin.com\/company\/dionach-ltd\",\"https:\/\/www.instagram.com\/dionachcyber\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Dionach - Penetration Testing Services | CREST-Certified","description":"Uncover and fix security weaknesses with expert penetration testing. Dionach simulates real attacks to protect your systems and data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dionach.com\/en-us\/services\/assurance\/penetration-testing\/","og_locale":"en_US","og_type":"article","og_title":"Dionach - Penetration Testing Services | CREST-Certified","og_description":"Uncover and fix security weaknesses with expert penetration testing. Dionach simulates real attacks to protect your systems and data.","og_url":"https:\/\/dionach.com\/en-us\/services\/assurance\/penetration-testing\/","og_site_name":"Dionach","article_publisher":"https:\/\/www.facebook.com\/dionachcyber","article_modified_time":"2025-11-11T15:54:40+00:00","og_image":[{"width":2048,"height":1365,"url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/06\/AdobeStock_594313160-1.jpeg?fit=2048%2C1365&ssl=1","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@dionachcyber","twitter_misc":{"Est. reading time":"21 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/dionach.com\/en-us\/services\/assurance\/penetration-testing\/","url":"https:\/\/dionach.com\/en-us\/services\/assurance\/penetration-testing\/","name":"Dionach - Penetration Testing Services | CREST-Certified","isPartOf":{"@id":"https:\/\/dionach.com\/en-us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dionach.com\/en-us\/services\/assurance\/penetration-testing\/#primaryimage"},"image":{"@id":"https:\/\/dionach.com\/en-us\/services\/assurance\/penetration-testing\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/06\/AdobeStock_594313160-1.jpeg?fit=2048%2C1365&ssl=1","datePublished":"2022-07-14T08:30:55+00:00","dateModified":"2025-11-11T15:54:40+00:00","description":"Uncover and fix security weaknesses with expert penetration testing. Dionach simulates real attacks to protect your systems and data.","breadcrumb":{"@id":"https:\/\/dionach.com\/en-us\/services\/assurance\/penetration-testing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dionach.com\/en-us\/services\/assurance\/penetration-testing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dionach.com\/en-us\/services\/assurance\/penetration-testing\/#primaryimage","url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/06\/AdobeStock_594313160-1.jpeg?fit=2048%2C1365&ssl=1","contentUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/06\/AdobeStock_594313160-1.jpeg?fit=2048%2C1365&ssl=1","width":2048,"height":1365},{"@type":"BreadcrumbList","@id":"https:\/\/dionach.com\/en-us\/services\/assurance\/penetration-testing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dionach.com\/en-us\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/dionach.com\/en-us\/services\/"},{"@type":"ListItem","position":3,"name":"Assurance","item":"https:\/\/dionach.com\/en-us\/services\/assurance\/"},{"@type":"ListItem","position":4,"name":"Penetration Testing"}]},{"@type":"WebSite","@id":"https:\/\/dionach.com\/en-us\/#website","url":"https:\/\/dionach.com\/en-us\/","name":"Dionach","description":"Real Security in a Virtual World","publisher":{"@id":"https:\/\/dionach.com\/en-us\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dionach.com\/en-us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dionach.com\/en-us\/#organization","name":"Dionach","url":"https:\/\/dionach.com\/en-us\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dionach.com\/en-us\/#\/schema\/logo\/image\/","url":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","contentUrl":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","width":512,"height":512,"caption":"Dionach"},"image":{"@id":"https:\/\/dionach.com\/en-us\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/dionachcyber","https:\/\/x.com\/dionachcyber","https:\/\/uk.linkedin.com\/company\/dionach-ltd","https:\/\/www.instagram.com\/dionachcyber\/"]}]}},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/Ph4Ojq-ci","_links":{"self":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/pages\/762","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/comments?post=762"}],"version-history":[{"count":0,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/pages\/762\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/pages\/740"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/media\/22409"}],"wp:attachment":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/media?parent=762"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}