Vulnerability Assessments & Penetration Testing
Assessments and Testing Completed On Time
Imagine the embarrassment of having to notify your customers and vendors that, because of you, their information may now also be in the hands of cybercriminals; paying pricey emergency IT fees while your operations are halted or severely limited for days or weeks, data loss, lost clients, potential lawsuits or government fines for violating data-breach laws. Your bank account drained, with no bank protection.
To prevent this type of loss, the newly updated FTC Safeguards Rule under the Gramm-Leach-Bliley Act (GLBA) requires dealerships to perform Vulnerability Assessments every six months and an annual Penetration Test. This may sound daunting and yet another item you do not have time for but can you really afford to not take action on these items?
Let us help breakdown the difference between a Vulnerability Assessment and Penetration Test, why they matter, and how they can easily be scheduled and completed on time.
Vulnerability Assessment
A Vulnerability Assessment is the process of defining, identifying, classifying, and prioritizing vulnerabilities in computer systems, applications, and network infrastructures. Vulnerability Assessments identify the security weaknesses, which can be exploited by cybercriminals, within a dealership's IT environment. Via automated testing tools, Dealer Cyber Solutions can analyze the data and provide a remediation plan for addressing any identified vulnerabilities.
Why Bi-Annually? You may be asking why does this type of testing need to occur 2x/year? New cybersecurity threats emerge daily. Couple that with the fact that your IT environment also changes frequently (be it new devices, applications, network changes etc.) and it becomes essential that vulnerability assessments be performed on a regular basis to keep up with the ever-evolving threat landscape.
Penetration Testing
Otherwise known as a PEN Test, Penetration testing evaluates the security of your IT environment by actually attempting to exploit the vulnerabilities identified via the Vulnerability Assessment. A PEN Test requires a combination of automated and manual techniques to safely compromise servers, endpoints, web applications, wireless networks, network devices, mobile devices, and other points of exposure. In other words, it is a real-life, real-time hack of your network. Once we identify a vulnerability, we then launch ensuing tactics to escalate administrative privileges and gain greater access into the your electronic assets and critical data.