How to Perform A Vulnerability Assessment
Posted on May 31, 2019 by Louise Howland
What is a vulnerability assessment?
Vulnerability assessments are an essential part in understanding the strengths and limits of your business’s cybersecurity. Performing a vulnerability assessment makes use of automated testing tools to identify threats and risks. Once complete, the results of the assessment are compiled into a report, along with recommendations for improving your security.
Organisations of any size face the risk of a cyber-attack. Small businesses in the UK are hacked every 19 seconds, at an average cost to SMEs of £25,700 in aftermath clear up. Fortunately, a comprehensive vulnerability assessment can help companies just like yours improve the security of their systems.
The importance of vulnerability assessments
The most important thing a vulnerability assessment gives you is clarity. A vulnerability assessment provides you with a clear picture of your IT’s defences, while providing a roadmap for how to assess the risks associated with any weaknesses and potential threats.
At the end of the assessment, you will have a better understanding of your IT assets, security flaws and potential risks. Armed with this understanding, you can reduce the likelihood that a cybercriminal will breach your systems and catch you off guard. You can have all the gates to your castle covered before invaders ever start attacking.
It’s important that you undertake vulnerability testing on a regular basis to ensure the security of their networks. Especially when changes are made to your system, such as when you introduce new services or install new equipment.
Perform your own vulnerability assessment
If you want to do a vulnerability assessment on your system, follow these steps:
Based on your scan, you should be able to identify clear issues. Detail them like so:
- The name of vulnerability
- The date of discovery
- The level of risk (high, medium, low)
- A detailed description of the vulnerability
- Details regarding the affected systems
- A demonstration of the vulnerability
- Details of how the vulnerability could be corrected
Armed with this basic list, you will be able to see your vulnerabilities, as well as a means to correct them. This in turn will help push your business to becoming a safer, more secure operation.
If you’re looking for help understanding the vulnerabilities in your business, get in touch with us. Our friendly team can help guide you through the risks in easy, jargon-free language.
Vulnerability assessments vs. penetration tests
A vulnerability assessment aims to uncover vulnerabilities in a network and recommend the appropriate mitigation or remediation to reduce or remove the risks.
Penetration testing is different. Unlike vulnerability assessments, penetration testing is more invasive (as the name suggests). Penetration tests are all about identifying vulnerabilities in a network and trying to exploit them. The goal of a penetration test is to check whether a vulnerability really exists and to prove that exploiting it can damage the application or network.
A vulnerability assessment often uses automated network security scanning tools. The data is collated into a report, which focuses on providing businesses with a list of vulnerabilities that need to be fixed.
While a vulnerability assessment is usually automated to cover a wide variety of unpatched vulnerabilities, penetration testing generally combines automated and manual techniques to help testers delve further into the vulnerabilities and exploit them to gain access to the network in a controlled environment.
A penetration test targets and exposes specific vulnerabilities, while a vulnerability assessment provides a road map for improvements across your entire IT infrastructure.
Types of vulnerability assessments
Vulnerability assessments are different, depending on your unique system or network vulnerabilities. Some of the different types of vulnerability assessment scans include:
- Network Scans
- Hosting Assessments
- WiFi Scans
- Application Scans
- Database Vulnerability Assessments
Network-based scans are used to identify network security attacks. This type of scan can also detect vulnerable systems on wired or wireless networks. To identify server-based vulnerabilities, host-based assessments locate and identify server, workstation or other network host vulnerabilities.
64% of people believe that their data is safe on WiFi networks. Wireless network scans put that to the test. In addition to identifying rogue access points (places where hackers can easily get onto your system), a wireless network scan can also validate the secure configuration of your WiFi.
Application scans can be used to test your company websites to detect software vulnerabilities and erroneous configurations in network or web applications. Finally, database scans can be used to identify the weak points in a database so as to prevent malicious attacks, such as SQL injection attacks.
A comprehensive vulnerability assessment will cover all aspects of your IT infrastructure in order to give you the best possible picture.