Pentests show the state of security. Why doesn’t anyone want to see that?

Was sagen Pentest über den Reifegrad der Cybersicherheit aus?

‘Our IT department can carry out pentests themselves if they think it’s a necessary measure…’

We often hear this from managers who have completely handed over the issue of cyber security to their IT department. But apart from the fact that tasks can be delegated, but not the responsibility for security, this attitude is dangerous:

FIRST ????????‍????

In times of a shortage of skilled labour, IT administrators in companies already have enough to do with their original tasks. Therefore, they tend to choose security measures that are efficient and easy to administer. Pentests do not fall into this category.

SECOND ????

The company’s IT department is usually somewhat overwhelmed by the task of carrying out pentests. Ethical hacking is a discipline in its own right that requires specialised skills (e.g. understanding binary or machine code). This is where in-house IT administrators are usually out of the picture, or at least lack the daily practice and experience that external pentesters bring to the table.

THIRD????

A pentest uncovers weaknesses. However, not every corporate culture allows mistakes to be discussed openly. Accordingly, there are IT departments that prefer not to carry out pentests too regularly if they are subsequently pilloried for the results.

ERGO:

Your own IT department is not always the best place to decide whether to carry out pentests or not. The decision is better left to top management because they deserve an unvarnished view of cyber security.

We believe that pentests or at least comprehensive vulnerability scans should be a regular routine in companies. Incidentally, standards such as ISO/IEC 27001 (ISMS) also require this – both ad hoc and regular tests.

You are currently viewing a placeholder content from YouTube. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.

More Information

Manuel Bohe

CEO
Manuel Bohé is your contact for everything to do with information and cyber security and advises our customers online and on site.

Jetzt weiterlesen!

Fill The Gap

Robots on patrol – How robotics and AI are changing the security industry with Severin Pfister (Ascento)

Security robots that independently monitor terrain, recognise anomalies and communicate with existing systems - what sounds like science fiction has long since become reality. In the latest episode of FILL THE GAP, the security podcast, we talk to Severin Pfister from Ascento about the use of robotics and artificial intelligence in property protection.

Security Compliance

NIS 2 and CER: How the delayed legal implementation in Germany is putting KRITIS operators under pressure

The resilience of our critical infrastructures (KRITIS) is at stake. While other EU countries have long since created facts, Germany is lagging alarmingly behind in the crucial implementation of European requirements for KRITIS security, in particular the NIS-2 and CER directives.

Fill The Gap, Security Consulting

FILL THE GAP – the new security podcast is here! 🎙

Security is complex - we help you to keep an overview. In FILL THE GAP, we talk to experts about current challenges, technological developments and real threat scenarios in the field of physical security!

Alternativ zum Formular können Sie uns auch eine E-Mail an info@concepture.de senden.

Instead of the form, you can also send us an email to info@concepture.de.