According to a report by Gartner, one laptop is stolen every 53 seconds
A stolen device can include a laptop, tablet, mobile phone or even a desktop PC. The job of the tester is to emulate what a hacker would do if they found or stole the device, but without the loss of data and associated breach costs.
With sales in corporate laptops and tablets outselling desktop PCs, testing those devices for what could be accessed by a rogue user has never been more important.
During our stolen device penetration test, we simulate an attempt at breaching your security using the device, which could have been lost or stolen, so that you can fully appreciate the risks and the potential consequences of a hacker getting access to one of these devices.
Our highly skilled penetration testing specialists will take your devices and test them as a real hacker would to identify all the ways that an attacker might gain unauthorised access and what data they could gain access to.
Reporting consists of three key elements: -
- Management Summary (Executive Summary)
- The number of issues/risks including and pass or fail of the test with a summary of findings with risk versus impact
- The technical details of the vulnerabilities found and the associated remediation
Stolen device tests can be conducted onsite at your organisation or at our secure testing laboratory in West Yorkshire, UK.