Vulnerability Assessments
Do You Know Your Businesses Weaknesses?
See how a vulnerability assessment could help your business.
Vulnerability Assessments
Vulnerability assessments are often confused with penetration testing, but it’s important for businesses to do both. Vulnerability assessments help a business identify threats in their computing infrastructure. These assessments also mitigate processes for reducing or eliminating any weaknesses discovered.
Performing vulnerability assessments is a proactive step to securing systems before there is an incident. A more secure system allows a business to save money and run more efficiently. In a world where more businesses are online than ever before, it’s not a matter of if a business might be targeted by hackers, but when. Taking a proactive approach helps thwart the inevitable attempts.

Elements of an Assessment
Some vulnerability assessments are simple scans that check for poor passwords, outdated apps, misconfigurations and other common vulnerabilities. These are more automated and catch numerous potential issues.
However, more in-depth vulnerability assessments look at all elements of your IT infrastructure to determine risks and which risks could bring your business to a grinding halt. These assessments include:
- Look at all business processes and which are most critical to the business
- Look for vulnerabilities in every app required by those processes
-
Check every possible data source, including mobile devices and cloud services
(mainly check for encryption and correct security settings)
-
Look at all hardware throughout a business’s IT infrastructure, such as servers
(including virtual)
-
Identify all security controls and processes currently in place and check for vulnerabilities
(mainly check for encryption and correct security settings)
-
Check every possible data source, including mobile devices and cloud services
(mainly check for encryption and correct security settings)
Reducing Risk
Does your business perform vulnerability assessments? If not, contact ISOutsource today and we’ll be happy to help you uncover any vulnerabilities and suggest ways to reduce your risks.
Vulnerability Scan FAQs
What is the impact of the scan?
The impact is almost always negligible. We do not run scans that are known to be intrusive unless specifically requested to do so. The only time we have seen a scan impact a system was due to grossly out of date software (WordPress). These same scans are being conducted regularly by researchers and attackers in the wild during all hours of the day. If those scans are not impacting your systems, it’s highly likely ours won’t either.
What does the scan tell me?
The scan takes a black box (zero knowledge) approach. It attempts to fingerprint the system and determine what vulnerabilities exist in the endpoint being scanned. An experienced security professional reviews the results, often augmenting the scan with additional reconnaissance to provide a risk rating, likelihood, and recommendation for remediation.
How often should I run a scan?
Will this scan help with my PCI (or other regulation) compliance?
I have an IPS/IDS that will block your scans. How can I make sure those systems are secure?
What addresses should I whitelist?
Ipv6: 2600:3c01::f03c:91ff:febb:8850
Ipv4: 45.79.100.200
Can you scan systems on AWS, Azure, GoDaddy, Bluehost, WP Engine, etc.?
Scanning systems other than your own often requires advanced notification and scheduling with the provider. These systems typically host multiple systems in shared environments meaning your scan could impact their other customers.
AWS Permission Request Form: https://aws.amazon.com/security/penetration-testing/