Ethical hacking: What to look for in a pen tester


Simulated attacks on a tending organization will facilitate InfoSec leaders assess their security posture, however not all pen testers are created equal and not each supplier is prepared to be tested.

Healthcare information breaches enlarged seventy between 2010 and 2017, in step with a recent study printed within the Journal of the yankee Medical Association. And with breaches cost accounting tending organizations $408 per patient record, the stakes are above ever.



The cybersecurity conversations are increasing at the room level and a few states and organizations ar crafting security models to assist organizations make certain they're best protected against those threats. therefore, simply wherever will penetration testing slot in the info sec toolkit?

Pen testing is that the follow of simulated cyberattacks on associate organization’s network or a selected perform, like IoT devices or internet apps. The goal is to spot any system flaws or weaknesses and simply however possible it's that a hacker will exploit these vulnerabilities.

Essentially, pen testers or white hat hackers, model what real-world villainous hackers do, below controlled circumstances in order that a company will higher perceive and manage risk. However, pen testing isn’t essentially ideal for everybody and a company can have to be compelled to be realistic regarding its security posture to see whether or not hiring a pen tester could be a good move.

What makes a decent pen tester?

The tending atmosphere creates a unique security surface than in alternative sectors like monetary. Medical devices, IoT, EHRs and a number of heritage computers produce a good vary of potential security risks.

To Lee Kim, director of privacy and security for HIMSS North America, a pen tester ought to have real world expertise and skill in business environments like.

“Pen testing during a tending atmosphere is completely different than pen testing during a monetary atmosphere,” said Kim.

The pen tester or potential security company should perceive the wants of the organization and considerations, explained John Nye, vice chairman of cybersecurity strategy for Synergistic. They conjointly have to be compelled to discuss the systems that are probably vulnerable, whereas each understanding and absolutely explaining the chance that testing those vulnerabilities will represent.

Healthcare organizations trying to rent a pen tester or team can have to be compelled to make sure the potential seller understands what's vital to the organization and be willing “to work with you to achieve that understanding.”

“This will be available in the shape of a partner that works with the tending business extensively, or a minimum of is receptive dynamic their typical approaches to accommodate the special wants of your organization,” said Nye.

“One of the foremost vital things to stay in mind is that no organization is like every alternative and any pen tester that tells you that ‘one size fits all’ isn't in it to assist you, they're attempting to sell their services,” he added.

Kim side that a decent pen tester encompasses a keen attention to detail and is correct and inventive, that is “very essential once you do a red team exercise.” For some, certifications could also be useful, as well. Also notable is that not all pen testers are created equal, explained Nye. “While it'd look like anyone with a touch expertise and gear will do that, the skillsets concerned in assaultive and exploiting numerous systems are literally quite specialised.”

So, whereas an online app pen takes a look after may be capable of playacting an enclosed network pen test, their special information would be wasted in most cases,” he added. “No one will realize it all, therefore we've got to select our corner of information and obtain specific at it. just in case you were speculative, my passion is folks and their role in security (and insecurity).

Comments