Get Compliant. Stay Compliant.

Penetration Testing

A penetration test, is also referred to as a pen test or scheduled ethical hacking. An authorised carefully structured cyberattack is carried out on a computer system, to evaluate the security of that system. This allows the identification of vulnerabilities as well as what data is vulnerable to give the business a real life view of their security posture. Running regular penetration tests is the best way to check the security of your system and often provides the right motivation to remove those vulnerabilities on an ongoing basis.

Key Differentiators

  • All consultancy is carried out by our fully qualified practitioners and consultants with over 10 years of industry experience.
  • Through our transparent and consultative approach, we can provide the right level of reporting to support the process of becoming secure on an ongoing basis.
  • CDS understands that regular penetration testing can be costly. However we are prepared to meet you in the middle so you can schedule regular pen tests with us.
A Data Subject Access Request is made by individuals who want to obtain details personal data an organisation holds about them. An individual can submit a DSAR either verbally or in writing. An individual does not have to submit a request to any particular person or department, they can submit a DSAR to any part of an organisation. Once received, you must respond to the DSAR within 30 days.

Pen Testing with CDS

 A penetration test will provide you with a point in time analysis of your susceptibility to a cyber-attack. Our testers will identify and assess the vulnerabilities that pose a threat to you. Once identified, our report will determine the probability and magnitude of the possible threats, vulnerabilities or risks associated with your systems or networks.

Our penetration testing provides you with:

  • A ranked list of identified vulnerabilities in priority order (point in time analysis)
  • The likelihood and probability of the exploitation of your current vulnerabilities
  • A series of actions or mitigating steps to resolve or reduce the vulnerability
Excellent Communication
25 Years of Experience
CREST-Accredited

Our testers will identify and assess the vulnerabilities that pose a threat to you.

We provide a FREE no obligation quotation specific to your individual needs. Get in touch now — available 9am to 5pm.

Penetration Testing for schools

Our penetration tests will provide your school with:

  • A ranked list of identified vulnerabilities in priority order (point in time analysis)
  • The likelihood and probability of the exploitation of your current vulnerabilities
  • A series of actions or mitigating steps to resolve or reduce the vulnerability

Internal Penetration Test – This type of tests is designed to simulate attacks to internal systems and networks as if performed by a malicious insider or an external attacker who has already successfully penetrated the perimeter defences.

External Penetration Test – Our testers will mimic the behaviour of a hacker.  We aim is to identify and exploit vulnerabilities found in the external facing systems and services, such as email servers and remote access terminals. 

Web Application Penetration Test – These tests are aimed at individual web applications to assess the security level and posture of the web application itself. 

Vulnerability scanning – Great for regular and systematic testing. Low-cost high frequency testing to inspect the potential points of exploit on a computer network to identify areas of concern. A vulnerability scan detects and classifies weaknesses in a network and predicts the effectiveness of countermeasures that we put in place to prevent a malicious attack.