{"id":4210,"date":"2019-01-14T01:25:54","date_gmt":"2019-01-14T06:25:54","guid":{"rendered":"https:\/\/tsisupport.com\/?p=4210"},"modified":"2021-08-09T05:52:17","modified_gmt":"2021-08-09T09:52:17","slug":"do-i-need-a-pen-test-how-to-know-if-pen-testing-is-the-right-move","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=4210","title":{"rendered":"How To Know If Network Pen Testing Is The Right Move"},"content":{"rendered":"<p><span style=\"color: #800000;\"><strong>What is Penetration Testing?<\/strong><\/span><\/p>\n<p>Penetration testing, also commonly referred to as ethical hacking or &#8220;pen testing&#8221; for short, is a process in which a business thoroughly tests its computer system, its network or its applications in an effort to uncover any and all security vulnerabilities that could potentially be exploited by someone with malicious intentions. This type of testing can either be automated and performed by specially designed computer software, or it can be performed manually by IT professionals depending on the needs of the situation.<\/p>\n<p>At TSI, pen testing is a topic that comes up very often with our clients in the context of security and compliance regulations. With this article, we want to help answer one of the most common questions we receive: whether or not you actually need a pen test.<\/p>\n<p>Pen testing itself is very expensive and, unfortunately, there is a lot of misinformation about the topic that leads to people making poor decisions at critical moments. The average global cost of a data breach rose 6.4% in 2018 from just one year prior, and now comes in at $3.86 million. That&#8217;s the average amount of monetary damage that a single incident can cause when downtime, the loss of data, lost productivity and damage to one&#8217;s reputation is concerned.<\/p>\n<p>Most of the time, the decision of whether or not to conduct a pen test is one that will be made for you. It&#8217;s a hard and firm requirement of many regulatory agencies as it&#8217;s the true cornerstone of verifying your business&#8217; security posture. There are, however, situations where penetration testing is not a requirement but a strong recommendation. In those cases, there are a lot of things that need to be done before a pen test is conducted that one needs to be aware of moving forward.<\/p>\n<p><span style=\"color: #800000;\"><strong>When is a Pen Test a Good Idea?<\/strong><\/span><\/p>\n<p>A penetration test is only a good idea after you&#8217;ve taken steps to implement every other security tool and solution that is required of you. Remember that penetration testers are meant to find exploitable vulnerabilities within your network after it&#8217;s already as secure as it can be.<\/p>\n<p>Invest in an appropriate antivirus solution. Work with a partner on proactive network scanning and monitoring. Make sure that all of your software is totally up to date and that you&#8217;re working from the latest version of your operating system of choice. Educate and train your users on security best practices. Once these types of steps are taken care of, then you can start worrying about penetration testing.<\/p>\n<p>Once you&#8217;ve fortified your infrastructure, a penetration tester will go in and determine if there are any remaining loopholes or vulnerabilities that can be exploited. They will then present you with a list of steps you can take to address those gaps for the most holistic security response possible.<\/p>\n<p>If you penetration test before your security solution is ready for it, you will certainly uncover vulnerabilities. However, this isn&#8217;t information you can put to good use because many of those vulnerabilities likely would have been addressed via the rest of your deployment.<\/p>\n<p><span style=\"color: #800000;\"><strong>When is Pen Testing Not a Good Idea?<\/strong><\/span><\/p>\n<p>Penetration testing is not a &#8220;silver bullet.&#8221; It is not the be all, end all solution to your security problems. If you have done nothing with your business&#8217; security up to this point, or if you haven&#8217;t implemented the common solutions you need to stay safe on a daily basis, penetration testing is more than a bad idea. It&#8217;s a waste of time and money.<\/p>\n<p>If you spend the money on penetration testing only to have that professional come back and say &#8220;we were able to exploit your network because your software wasn&#8217;t up to date,&#8221; you&#8217;re not learning anything you don&#8217;t already know. This is a confirmation that you failed to take a step you should have and at that point, penetration testing is only underlining what is essentially common sense.<\/p>\n<p>Identify what obvious vulnerabilities exist with assistance from a cyber security expert and\/or a security assessment, then invest in penetration testing to confirm whether your strategy is as effective as you think it is. If you don&#8217;t have a strategy to speak of, the best penetration testing professional in the world isn&#8217;t going to be able to help you.<\/p>\n<p><span style=\"color: #800000;\"><strong>In the End<\/strong><\/span><\/p>\n<p>The most important thing for all business professionals to understand is that pen testing, as is true with IT security in general, is not a one time engagement. Penetration testing isn&#8217;t something you do once a year and revisit. IT threats are constantly evolving and your security must evolve with it. This requires daily vigilance and dedication to truly and absolutely safeguard your information technology infrastructure.<\/p>\n<p>It is a mistake to look at IT in terms of &#8220;a one time server upgrade&#8221; or similar periodic bouts of maintenance. In many ways, the perfect metaphor for this is one&#8217;s own health. With your physical condition, you&#8217;re only ever as good as your last workout. If you work out once and never again, you&#8217;re only becoming weaker every day.<\/p>\n<p>If you actually want to maintain your health, you have to consider diet, hygiene, rest and exercise and you need to practice these things day in and day out. To that end, penetration testing is very similar to going to a doctor&#8217;s office and getting a physical. The fact that you&#8217;ve been working out and eating healthy for the last seven days won&#8217;t stave off the negative health implications of the poor diet and inactive lifestyle you enjoyed for the six months leading up to it.<\/p>\n<p>If you want to be healthy, you have to work for it. If you want to make sure that your business is protected and that everything you&#8217;ve already worked so hard to build is safe, you need to do the same.<\/p>\n<p><span style=\"color: #800000;\"><strong>In the End<\/strong><\/span><\/p>\n<p>If you\u2019d like to discuss penetration testing or cyber security with an expert, and find out the right move for your business, then feel free to <a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\" target=\"_blank\" rel=\"noopener noreferrer\">contact us<\/a> at TSI Support.<\/p>\n<div class=\"fl-builder-content fl-builder-content-8352 fl-builder-template fl-builder-row-template fl-builder-global-templates-locked\" data-post-id=\"8352\"><div class=\"fl-row fl-row-full-width fl-row-bg-photo fl-node-5ecccdbce25c0 fl-row-default-height fl-row-align-center fl-row-bg-overlay BlogCTA\" data-node=\"5ecccdbce25c0\">\n\t<div class=\"fl-row-content-wrap\">\n\t\t\t\t\t\t\t\t<div class=\"fl-row-content fl-row-fixed-width fl-node-content\">\n\t\t\n<div class=\"fl-col-group fl-node-5ecccdbce2d8e fl-col-group-equal-height fl-col-group-align-center fl-col-group-custom-width fl-col-group-responsive-reversed\" data-node=\"5ecccdbce2d8e\">\n\t\t\t<div class=\"fl-col fl-node-5ecccdbce2f49 fl-col-bg-color fl-col-small-custom-width\" data-node=\"5ecccdbce2f49\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-heading fl-node-5eccce25ec3d2 sec-title title-img-none\" data-node=\"5eccce25ec3d2\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<h2 class=\"fl-heading\">\n\t\t<span class=\"fl-heading-text\">Confident with Your IT Strategy?<\/span>\n\t<\/h2>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-rich-text fl-node-5eccce77546d9\" data-node=\"5eccce77546d9\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-rich-text\">\n\t<p>If you found the information in this blog post helpful and you'd like to discuss your business' technology strategy, then we'd be happy to hear from you.<\/p>\n<\/div>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-button fl-node-5ecccec3237e8 primary-btn\" data-node=\"5ecccec3237e8\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-button-wrap fl-button-width-auto fl-button-left\">\n\t\t\t<a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\"  target=\"_self\"  class=\"fl-button\" >\n\t\t\t\t\t\t\t<span class=\"fl-button-text\">Get in touch with tsi<\/span>\n\t\t\t\t\t<\/a>\n<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t<div class=\"fl-col fl-node-5ecccf1e8a49c fl-col-bg-color fl-col-small fl-col-small-custom-width\" data-node=\"5ecccf1e8a49c\">\n\t<div class=\"fl-col-content fl-node-content\"><\/div>\n<\/div>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div><div class=\"uabb-js-breakpoint\" style=\"display: none;\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>What is Penetration Testing? Penetration testing, also commonly referred to as ethical hacking or &#8220;pen testing&#8221; for short, is a process in which a business thoroughly tests its computer system, its network or its applications in an effort to uncover any and all security vulnerabilities that could potentially be exploited by someone with malicious intentions.&hellip;<\/p>\n","protected":false},"author":7,"featured_media":8679,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[20],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Know if Network Penetration Testing is Necessary | TSI<\/title>\n<meta name=\"description\" content=\"Determine whether your business would benefit from network penetration testing by reading this post written by TSI experts. Preparation starts here.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Know if Network Penetration Testing is Necessary | TSI\" \/>\n<meta property=\"og:description\" content=\"Determine whether your business would benefit from network penetration testing by reading this post written by TSI experts. Preparation starts here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=4210\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-14T06:25:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-09T09:52:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/01\/Do-I-Need-a-Pen-Test-1140x380-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\n\t<meta property=\"og:image:height\" content=\"380\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jeremy Louise\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeremy Louise\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=4210\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=4210\",\"name\":\"How to Know if Network Penetration Testing is Necessary | TSI\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=4210#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=4210#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/01\/Do-I-Need-a-Pen-Test-1140x380-1.jpg\",\"datePublished\":\"2019-01-14T06:25:54+00:00\",\"dateModified\":\"2021-08-09T09:52:17+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/48ad37aeeae9afb7d52479029f14f926\"},\"description\":\"Determine whether your business would benefit from network penetration testing by reading this post written by TSI experts. Preparation starts here.\",\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=4210#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=4210\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=4210#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/01\/Do-I-Need-a-Pen-Test-1140x380-1.jpg\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/01\/Do-I-Need-a-Pen-Test-1140x380-1.jpg\",\"width\":1140,\"height\":380},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=4210#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How To Know If Network Pen Testing Is The Right Move\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/48ad37aeeae9afb7d52479029f14f926\",\"name\":\"Jeremy Louise\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e2a1c4b01ee6c09554d8f086ff657b1a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e2a1c4b01ee6c09554d8f086ff657b1a?s=96&d=mm&r=g\",\"caption\":\"Jeremy Louise\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=7\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Know if Network Penetration Testing is Necessary | TSI","description":"Determine whether your business would benefit from network penetration testing by reading this post written by TSI experts. Preparation starts here.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"How to Know if Network Penetration Testing is Necessary | TSI","og_description":"Determine whether your business would benefit from network penetration testing by reading this post written by TSI experts. Preparation starts here.","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=4210","og_site_name":"TSI Support","article_published_time":"2019-01-14T06:25:54+00:00","article_modified_time":"2021-08-09T09:52:17+00:00","og_image":[{"width":1140,"height":380,"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/01\/Do-I-Need-a-Pen-Test-1140x380-1.jpg","type":"image\/jpeg"}],"author":"Jeremy Louise","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jeremy Louise","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=4210","url":"https:\/\/tsisupport.com\/tsistaging\/?p=4210","name":"How to Know if Network Penetration Testing is Necessary | TSI","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=4210#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=4210#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/01\/Do-I-Need-a-Pen-Test-1140x380-1.jpg","datePublished":"2019-01-14T06:25:54+00:00","dateModified":"2021-08-09T09:52:17+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/48ad37aeeae9afb7d52479029f14f926"},"description":"Determine whether your business would benefit from network penetration testing by reading this post written by TSI experts. Preparation starts here.","breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=4210#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=4210"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=4210#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/01\/Do-I-Need-a-Pen-Test-1140x380-1.jpg","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/01\/Do-I-Need-a-Pen-Test-1140x380-1.jpg","width":1140,"height":380},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=4210#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"How To Know If Network Pen Testing Is The Right Move"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/48ad37aeeae9afb7d52479029f14f926","name":"Jeremy Louise","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e2a1c4b01ee6c09554d8f086ff657b1a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e2a1c4b01ee6c09554d8f086ff657b1a?s=96&d=mm&r=g","caption":"Jeremy Louise"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=7"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/4210"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4210"}],"version-history":[{"count":0,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/4210\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/media\/8679"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}