|Security Testing and Vulnerability Assessment
Defeating Hackers at Their Own Game
Gold Lock evaluates the security of a computer system or network by simulating an attack from a malicious source (hacker).
The process involves an active analysis of the system from the position of a potential attacker for any potential vulnerability that could result from improper system configuration, outdated hardware or software flaws, or operational weaknesses in process or technical countermeasures.
Any security issues that are found are confidentially presented to the system owner, together with an assessment of their impact, and with a detailed proposal for a quick resolution of the discovered breach.
The intent of a penetration test is to determine the feasibility of an attack and the amount potential damage of a successful exploit, if discovered.
Depending on the scope of work, a typical report would include any or all of these components: