Cyber Security

Ransomware Vulnerability Assessment

Discover how criminals could attack your systems and data to make them inaccesible and demand a ransom of hundred of thousands, or millions

Cyber Security

Ransomware Vulnerability Assessment

Discover how criminals could attack your systems and data to make them inaccessible and demand a ransom of hundred of thousands, or millions. And how to prevent that from happening.

Process of Ransomware Vulnerability Assessment

Simulating a Ransomware Attack

Any company can fall victim to ransomware. Securance will attempt to break into your network using various methods often applied by cyber criminals. Our findings will result in a comprehensive report detailing technical improvements towards fortifying your defenses against ransomware.

Phishing Test

We send all employees a phishing e-mail and record responses. How difficult is it for an attacker to get an initial foothold by phishing?

External Network Test

Another way hackers take a first step into your networks is by finding vulnerable internet-connected services. We check how hard you’re making it for them to do this.

Workstation Test

If phishing is successful, hackers often only have limited access to a single laptop. Can they break out to get more access to your network?

internal network test

We check the internal network for opportunities for hackers to get into more systems than they initially broke into. How hard is it to move around?

Windows Domain Test

A crucial part of many corporate networks is the Windows Domain. If a hacker succeeds in getting Domain Administrator rights, (s)he’s almost ready to deploy ransomware. Can we make this more difficult to achieve for them?

Cloud configuration review

We use a ”read only” account to check your Azure, Google Cloud, or AWS environment’s settings for opportunities to improve security.

Interview about back-ups

With your IT staff, we go through the ways back-ups are made and kept. Can backups survive a ransomware attack? And how quickly can you restore your entire IT enviroment from back-up?

Phishing Test

We send all employees a phishing e-mail and record responses. How difficult is it for an attacker to get an initial foothold by phishing?

external network test

Another way hackers take a first step into your networks is by finding vulnerable internet-connected services. We check how hard you’re making it for them to do this.

Workstation test

If phishing is successful, hackers often only have limited access to a single laptop. Can they break out to get more access to your network?

Internal network test

We check the internal network for opportunities for hackers to get into more systems than they initially broke into. How hard is it to move around?

Windows domain test

A crucial part of many corporate networks is the Windows Domain. If a hacker succeeds in getting Domain Administrator rights, (s)he’s almost ready to deploy ransomware. Can we make this more difficult to achieve for them?

Cloud configuration review

We use a ”read only” account to check your Azure, Google Cloud, or AWS environment’s settings for opportunities to improve security.

Interview About Back-Ups

With IT staff to go through the ways back-ups are made, kept, and can be quickly restored, with a focus on the potential for attackers to destroy backups.

Plans

Plans that fit your scale

Simple, transparent pricing that grows with you. Try any plan free for 30 days.

One Time

Popular

2 Year Subscription

5 Year Subscription

3 Months Free on Your Pen-Testing Subscription

Be prepared for potential security vulnerabilities through Securance’s Ransomware Vulnerability Assessment subscription. Our free follow-up scans will keep you up-to-date on vulnerability status and keep you in control.

Pentesting Certificate

Securance has been certified in accordance with the Dutch national pentesting certification, the “Keurmerk Pentesten”. The CCV (Dutch national Centre for Crime Prevention and Safety) maintains this standard. We include this mark in all our security test reports. See the CCV website (Dutch) for more information.