Skip to main content
Process of Ransomware Vulnerability Assessment

Simulating a Ransomware Attack

Any company can fall victim to ransomware. Securance will attempt to break into your network using various methods often applied by cyber criminals. Our findings will result in a comprehensive report detailing technical improvements towards fortifying your defenses against ransomware.

ranso-icon-1.svg

Phishing Test

We send all employees a phishing e-mail and record responses. How difficult is it for an attacker to get an initial foothold by phishing?

Connector-line Connector-line
ransom-icon-2.svg

External Network Test

Another way hackers take a first step into your networks is by finding vulnerable internet-connected services. We check how hard you’re making it for them to do this.

Connector-line Connector-line
ransom-icon-3.svg

Workstation Test

If phishing is successful, hackers often only have limited access to a single laptop. Can they break out to get more access to your network?

Connector-line Connector-line
ransom-internal.svg

internal network test

We check the internal network for opportunities for hackers to get into more systems than they initially broke into. How hard is it to move around?

Connector-line Connector-line
ransom-icon-4.svg

Windows Domain Test

A crucial part of many corporate networks is the Windows Domain. If a hacker succeeds in getting Domain Administrator rights, (s)he’s almost ready to deploy ransomware. Can we make this more difficult to achieve for them?

Connector-line Connector-line
ransom-icon-5.svg

Cloud configuration review

We use a ”read only” account to check your Azure, Google Cloud, or AWS environment’s settings for opportunities to improve security.

Connector-line Connector-line
ransom-icon-6.svg

Interview about back-ups

With your IT staff, we go through the ways back-ups are made and kept. Can backups survive a ransomware attack? And how quickly can you restore your entire IT enviroment from back-up?

Connector-line Connector-line
Plans

Plans that fit your scale

Simple, transparent pricing that grows with you. Try any plan free for 30 days.

One Time

  • Highest quality penetration test
  • Clear, understandable PDF report
  • Monthly followup scan
  • Annual repeat pentest
  • Free access to Insight dashboard
  • Free issue remediation support

Popular1
2 Year Subscription

  • Highest quality penetration test
  • Clear, understandable PDF report
  • Monthly followup scan
  • Annual repeat pentest
  • Free access to Insight dashboard
  • Free issue remediation support

5 Year Subscription

  • Highest quality penetration test
  • Clear, understandable PDF report
  • Monthly followup scan
  • Annual repeat pentest
  • Free access to Insight dashboard
  • Free issue remediation support

3 Months Free on Your Pen-Testing Subscription

Be prepared for potential security vulnerabilities through Securance’s Ransomware Vulnerability Assessment subscription. Our free follow-up scans will keep you up-to-date on vulnerability status and keep you in control.

Cloud-Icons.svg
pentestingcvv.svg

Pentesting Certificate

Securance has been certified in accordance with the Dutch national pentesting certification, the “Keurmerk Pentesten”. The CCV (Dutch national Centre for Crime Prevention and Safety) maintains this standard. We include this mark in all our security test reports. See the CCV website (Dutch) for more information.