
In an era where data breaches are becoming increasingly common, it is crucial for organisations to assess their overall risk to avoid becoming the next victim. Organisations cannot protect themselves from risks they are unaware of, and many are unsure where to begin.
As attackers grow more sophisticated and conduct regular attacks, it is essential for organisations to establish and maintain an information security program that provides flexibility in assessing their environments.
Small and mid-sized businesses (SMBs) often overlook the security implications of digital transformation as they adopt new technologies like artificial intelligence (AI), cloud computing, and the internet of things (IoT). This oversight leaves many organisations vulnerable to cyber theft, scams, extortion, and other cyber crimes. Consequently, two-thirds of SMBs experienced a security breach in the past year, with cyber attacks becoming more sophisticated, targeted, and damaging. With the average cost per incident exceeding $380,000, a single security breach can be devastating for a small firm. Therefore, it is vital for SMBs to prioritise cyber security.
Penetration Test vs Vulnerability Test
A vulnerability assessment merely informs the customer that the door is unlocked. In contrast, a penetration test reveals that, due to the unlocked door, we discovered an unsecured safe, exposed jewellery, credit cards, and social security numbers scattered on the bed. It also provides guidance on securing the door in the future and protecting the confidential data left out in the open.
What a Vulnerability Test will find:
‣ Patching vulnerabilities
‣ Default passwords amongst services
‣ Configuration deficiencies
‣ False positive vulnerabilities
(e.g. flagging services based on version numbers, not knowing if patches are applied)
What a Penetration Test will find:
‣ Weak domain user account passwords
‣ Sensitive files stored on network shares
‣ Sensitive data within databases
‣ Weak password policies
‣ Network share permission issues
‣ Man-in-the-middle attacks and possibilities
Scope and Methodology
Scope and Methodology
Armour Networks provides the ability for organisations to perform a variety of security assessments, including vulnerability assessments as well as penetration tests.
External Network Vulnerability Assessment
Vulnerability Analysis – The primary process in an external network vulnerability assessment is a vulnerability analysis. This involves conducting a vulnerability scan across all systems accessible via the Internet using a database of known vulnerabilities. The discovered vulnerabilities are ranked based on severity and other data extracted from the vulnerability scanner. We do not alter any severity rankings or information produced by the scanner.
Internal Network Vulnerability Assessment
Vulnerability Analysis – Similar to the external assessment, the internal network vulnerability assessment focuses on vulnerability analysis. This includes scanning all systems accessible via the internal network environment using a database of known vulnerabilities. The vulnerabilities discovered are ranked based on severity and other data from the scanner. We do not modify any severity rankings or information produced by the scanner.
External Network Penetration Test
The internal and external testing phases share many similarities, except for the use of Open-Source Intelligence (OSINT). These assessments take a comprehensive approach to identifying security vulnerabilities that expose systems and services to potential threats. Our consultants use various resources and techniques to identify, enumerate, and exploit the targeted systems.
Internal Network Penetration Test
During the information gathering phase of the internal network penetration test, our consultant gathers information about the internal network environment based on available data without conducting any attacks. This includes information such as DNS names and Fully Qualified Domain Names (FQDN) learned from DHCP and internal DNS records.
Benefits of Penetration Testing With Us:
Run a penetration test on your schedule:
We offer scheduling flexibility. Let us know what day and time you’d like us to perform your penetration test and we can get it scheduled immediately with no delays.
Real-time Notifications:
Notifications are always sent out when the penetration test starts and stops, keeping important individuals in the know as to when things are going on. This is also helpful in case there are some alerts that get triggered.
Reports that Drive Results:
The data provided in the reports will always be very informative. How these risks affect your organisation, where your organisation stands compared to its peers, how this compares to the last assessment, etc. are all examples of data that are included in each report.
Custom SoftwareTransparency at Your Fingertips:
Your IT team can always log into their portal to get a list of contacts involved in the project, communicate with our consultant, as well as get a progress update that provides preliminary results and expected completion dates.
Affordability:
Our pricing is very competitive when compared to traditional penetration testing firms but provides a lot more value for the same or smaller price point.
Reduce Turnaround Time for Detection and Response:
Because all activities are tracked, including any manual activities conducted by a consultant, organisations can download this activity log and correlate activities with their SIEM and incident response procedures.
Facts & Stats
- Data breaches exposed 4.1 billion records in the first half of 2019, a 54% increase over the first half of last year. Source: 2019 Risk Based Security Report
- Two in three SMBs suffered cyberattacks and data breaches in the past year. Source: 2019 Global State of Cybersecurity in Small and Medium-Sized Businesses by Keeper Security and Ponemon Institute
- Last year, 43% of reported data breaches involved small to mid-sized businesses (SMBs), so say what you will about cybercrime, but it does not discriminate. Source: 2023 Accenture’s Cybercrime study
- However, in comparison with larger organisations, SMBs usually have very few resources to draw on in order to protect themselves against cyber threats and to help them recover if they experience a security breach. In line with this, a 2019 survey found that 25% of SMBs suffering a data breach in the previous 12 months ended up filing for bankruptcy and 10% actually went out of business. Source: National Cyber Security Alliance (2019).
- According to a recent industry study, the biggest challenge preventing small companies from optimising their security strategy is actually a lack of qualified staff, which affects a whopping 77% of SMBs. Source: Keeper Security & Ponemon Institute – 2019
- According to a recent study, a staggering 76% of US SMBs suffered a cyberattack last year, and 69% experienced a data breach. Source: Ibid.
- Since 2017, over 22,000 new software and hardware vulnerabilities have been disclosed every year, leaving organisations of all sizes struggling to keep their systems updated. Source: Risk Based Security – 2020
- SMBs often need over a month to install critical patches affecting operating systems (35%) and third- party software (58%), putting them at risk of cyberattacks exploiting brand new vulnerabilities. Source: Kaseya – 2019
- Further complicating matters is the fact that many threat campaigns exploit vulnerabilities with relatively low CVSS scores that companies are less likely to prioritize. Source: RiskSense – 2019
- Recent research reveals that 4 out of 5 data breaches are the result of threat actors exploiting weak and/or stolen passwords. Many SMBs are vulnerable to password-based attacks because they have not implemented a proper password management strategy. Source: World Economic Forum – 2020
- Only 41% of small and mid-market firms enforce periodic password changes, just 38% prevent password reuse on internal systems and a mere 29% require a minimum password length. To make things worse, few companies regularly check if employee email accounts have been compromised in a data breach. Source: Keeper Security & Ponemon Institute – 2019
- Last year the vast majority of SMBs were targeted with exploits and/or malware that evaded their anti-virus (82%) and intrusion detection system (69%). Source: Keeper Security & Ponemon Institute – 2019
Book Demo

The best network penetration test, ready at your convenience.
Meets Compliance - The entire solution and reports meet compliance requirements for regulated industries: PCI, HIPAA, SOC2, etc., and cyber insurance.
On-Demand Scheduling - An internal or external network penetration test can be scheduled at any time and any frequency, allowing for more up-to-date discovery of threats and potential impact.
Budget-friendly - More value at a fraction of the cost compared to any traditional network penetration test.
Fast Turnaround Time - In a rush to have an assessment done? Get a full blown penetration test and report done within a few days without breaking the bank.
Real-time Tracking - Monitor the progress of the assessment in real-time so there's no lack in communication.
Activity Logging - Every single activity performed by the pentest VM will be logged – everything.
Enhanced Security - Based on the real-time logs, customers will be able to correlate the logs and activities with their log management and alerting solutions
Sydney MSP ©2025. All Rights Reserved. | Sitemap