{"id":3533,"date":"2025-04-10T16:20:31","date_gmt":"2025-04-10T16:20:31","guid":{"rendered":"https:\/\/forensiccontrol.com\/services\/vulnerability-scanning\/"},"modified":"2026-02-13T11:14:54","modified_gmt":"2026-02-13T11:14:54","slug":"vulnerability-scanning","status":"publish","type":"services","link":"https:\/\/forensiccontrol.com\/services\/vulnerability-scanning\/","title":{"rendered":"Vulnerability Scanning"},"content":{"rendered":"\n<div class=\"wp-block-group fc-main\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<p>The number one way that cyber criminals commit data breaches and put malware and ransomware on your devices is by exploiting vulnerabilities such as out-of-date software. Our Vulnerability Scanning program starts by installing a discreet agent on your devices to regularly scan your operating system, apps, browsers and more to check whether there are any holes in your security. This automated system will tell you if you need to update newer versions, install security patches or put other updates in place to stay protected.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group fc-faq\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"schema-faq wp-block-yoast-faq-block\"><div class=\"schema-faq-section\" id=\"faq-question-1770810500159\"><strong class=\"schema-faq-question\"><strong>What is a vulnerability scan, and why does my business need one?<\/strong><\/strong> <p class=\"schema-faq-answer\">A vulnerability scan is an automated security check. It scans your network and applications for known weaknesses, such as missing updates or insecure settings. These weaknesses are commonly exploited by attackers. Because new threats appear daily, vulnerability scanning is a key baseline security control.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1770810534089\"><strong class=\"schema-faq-question\"><strong>How is a vulnerability scan different from a Penetration Test?<\/strong><\/strong> <p class=\"schema-faq-answer\">The difference is in its scope and depth. A vulnerability scan is an automated and broad test, designed to identify a wide-range of potential weaknesses. A penetration test by contrast is manual and in-depth, conducted by a security specialist who not only finds vulnerabilities, but confirms whether they can be exploited. A combination of regular (fortnightly or monthly) vulnerability scans and annual penetration tests provides a decent level of reassurance for most organisations.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1770810590589\"><strong class=\"schema-faq-question\"><strong>Will it disrupt my team\u2019s work?<\/strong><\/strong> <p class=\"schema-faq-answer\">No, it won\u2019t. The scans are non-intrusive, running in the background. Your systems remain stable, and staff can continue working as normal.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1770810619122\"><strong class=\"schema-faq-question\"><strong>What is the difference between an Internal and External scan?<\/strong><\/strong> <p class=\"schema-faq-answer\">\u2022 <strong>External scans<\/strong> assess systems exposed to the internet, such as routers, from an attacker\u2019s perspective.<br\/>\u2022 <strong>Internal scans<\/strong> assess systems inside of your organisation, such as laptop\u00a0 or and desktop computers.<br\/>Taken together both internal and external scans provide a good understanding of your security risks.<br\/><\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1770810658889\"><strong class=\"schema-faq-question\"><strong>Why do you offer 12 months of scanning for free?<\/strong><\/strong> <p class=\"schema-faq-answer\">Security is not a one-time activity, with new vulnerabilities discovered continuously. We include 12 months of scanning with our Cyber Essentials Plus packages so that risks can be identified throughout the year, not just at the point of certification.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1770810690389\"><strong class=\"schema-faq-question\"><strong>How do these scans support Cyber Essentials?<\/strong><\/strong> <p class=\"schema-faq-answer\">Cyber Essentials Plus requires evidence that systems are secure and up to date. Our scans identify issues that would cause an audit failure. We help you remediate these issues before assessment, improving first-time pass rates.<\/p> <\/div> <\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Identify weaknesses in your network before cyber criminals do. Our vulnerability scanning service proactively detects security gaps, misconfigurations, and outdated software, helping you strengthen your defences against cyber threats.<\/p>\n","protected":false},"author":16,"featured_media":3532,"parent":0,"menu_order":0,"template":"","taxonomy\/team":[37],"taxonomy\/testimonials":[],"taxonomy\/case-study":[],"class_list":["post-3533","services","type-services","status-publish","has-post-thumbnail","hentry","team-jonathan-krause"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vulnerability Scanning | Forensic Control | Cyber Security<\/title>\n<meta name=\"description\" content=\"Forensic Control&#039;s Vulnerability Scanning services protect your business from cyber criminals exploiting data breaches and malware\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/forensiccontrol.com\/services\/vulnerability-scanning\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability Scanning | Forensic Control | Cyber Security\" \/>\n<meta property=\"og:description\" content=\"Forensic Control&#039;s Vulnerability Scanning services protect your business from cyber criminals exploiting data breaches and malware\" \/>\n<meta property=\"og:url\" content=\"https:\/\/forensiccontrol.com\/services\/vulnerability-scanning\/\" \/>\n<meta property=\"og:site_name\" content=\"Forensic Control\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-13T11:14:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/forensiccontrol.com\/wp-content\/uploads\/2023\/05\/Secure-your-success.png\" \/>\n\t<meta property=\"og:image:width\" content=\"820\" \/>\n\t<meta property=\"og:image:height\" content=\"462\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicControl\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"WebPage\",\"FAQPage\"],\"@id\":\"https:\\\/\\\/forensiccontrol.com\\\/services\\\/vulnerability-scanning\\\/\",\"url\":\"https:\\\/\\\/forensiccontrol.com\\\/services\\\/vulnerability-scanning\\\/\",\"name\":\"Vulnerability Scanning | Forensic Control | Cyber Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/forensiccontrol.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/forensiccontrol.com\\\/services\\\/vulnerability-scanning\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/forensiccontrol.com\\\/services\\\/vulnerability-scanning\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/forensiccontrol.com\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/67f3f75c6aba2b3b6c97389f_1-20qr-scan.svg\",\"datePublished\":\"2025-04-10T16:20:31+00:00\",\"dateModified\":\"2026-02-13T11:14:54+00:00\",\"description\":\"Forensic Control's Vulnerability Scanning services protect your business from cyber criminals exploiting data breaches and malware\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/forensiccontrol.com\\\/services\\\/vulnerability-scanning\\\/#breadcrumb\"},\"mainEntity\":[{\"@id\":\"https:\\\/\\\/forensiccontrol.com\\\/services\\\/vulnerability-scanning\\\/#faq-question-1770810500159\"},{\"@id\":\"https:\\\/\\\/forensiccontrol.com\\\/services\\\/vulnerability-scanning\\\/#faq-question-1770810534089\"},{\"@id\":\"https:\\\/\\\/forensiccontrol.com\\\/services\\\/vulnerability-scanning\\\/#faq-question-1770810590589\"},{\"@id\":\"https:\\\/\\\/forensiccontrol.com\\\/services\\\/vulnerability-scanning\\\/#faq-question-1770810619122\"},{\"@id\":\"https:\\\/\\\/forensiccontrol.com\\\/services\\\/vulnerability-scanning\\\/#faq-question-1770810658889\"},{\"@id\":\"https:\\\/\\\/forensiccontrol.com\\\/services\\\/vulnerability-scanning\\\/#faq-question-1770810690389\"}],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/forensiccontrol.com\\\/services\\\/vulnerability-scanning\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/forensiccontrol.com\\\/services\\\/vulnerability-scanning\\\/#primaryimage\",\"url\":\"https:\\\/\\\/forensiccontrol.com\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/67f3f75c6aba2b3b6c97389f_1-20qr-scan.svg\",\"contentUrl\":\"https:\\\/\\\/forensiccontrol.com\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/67f3f75c6aba2b3b6c97389f_1-20qr-scan.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/forensiccontrol.com\\\/services\\\/vulnerability-scanning\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/forensiccontrol.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\\\/\\\/forensiccontrol.com\\\/services\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Vulnerability Scanning\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/forensiccontrol.com\\\/#website\",\"url\":\"https:\\\/\\\/forensiccontrol.com\\\/\",\"name\":\"Forensic Control\",\"description\":\"Cyber Security experts\",\"publisher\":{\"@id\":\"https:\\\/\\\/forensiccontrol.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/forensiccontrol.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Question\",\"@id\":\"https:\\\/\\\/forensiccontrol.com\\\/services\\\/vulnerability-scanning\\\/#faq-question-1770810500159\",\"position\":1,\"url\":\"https:\\\/\\\/forensiccontrol.com\\\/services\\\/vulnerability-scanning\\\/#faq-question-1770810500159\",\"name\":\"What is a vulnerability scan, and why does my business need one?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"A vulnerability scan is an automated security check. It scans your network and applications for known weaknesses, such as missing updates or insecure settings. These weaknesses are commonly exploited by attackers. Because new threats appear daily, vulnerability scanning is a key baseline security control.\",\"inLanguage\":\"en-GB\"},\"inLanguage\":\"en-GB\"},{\"@type\":\"Question\",\"@id\":\"https:\\\/\\\/forensiccontrol.com\\\/services\\\/vulnerability-scanning\\\/#faq-question-1770810534089\",\"position\":2,\"url\":\"https:\\\/\\\/forensiccontrol.com\\\/services\\\/vulnerability-scanning\\\/#faq-question-1770810534089\",\"name\":\"How is a vulnerability scan different from a Penetration Test?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"The difference is in its scope and depth. A vulnerability scan is an automated and broad test, designed to identify a wide-range of potential weaknesses. A penetration test by contrast is manual and in-depth, conducted by a security specialist who not only finds vulnerabilities, but confirms whether they can be exploited. A combination of regular (fortnightly or monthly) vulnerability scans and annual penetration tests provides a decent level of reassurance for most organisations.\",\"inLanguage\":\"en-GB\"},\"inLanguage\":\"en-GB\"},{\"@type\":\"Question\",\"@id\":\"https:\\\/\\\/forensiccontrol.com\\\/services\\\/vulnerability-scanning\\\/#faq-question-1770810590589\",\"position\":3,\"url\":\"https:\\\/\\\/forensiccontrol.com\\\/services\\\/vulnerability-scanning\\\/#faq-question-1770810590589\",\"name\":\"Will it disrupt my team\u2019s work?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"No, it won\u2019t. The scans are non-intrusive, running in the background. Your systems remain stable, and staff can continue working as normal.\",\"inLanguage\":\"en-GB\"},\"inLanguage\":\"en-GB\"},{\"@type\":\"Question\",\"@id\":\"https:\\\/\\\/forensiccontrol.com\\\/services\\\/vulnerability-scanning\\\/#faq-question-1770810619122\",\"position\":4,\"url\":\"https:\\\/\\\/forensiccontrol.com\\\/services\\\/vulnerability-scanning\\\/#faq-question-1770810619122\",\"name\":\"What is the difference between an Internal and External scan?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"\u2022 <strong>External scans<\\\/strong> assess systems exposed to the internet, such as routers, from an attacker\u2019s perspective.<br\\\/>\u2022 <strong>Internal scans<\\\/strong> assess systems inside of your organisation, such as laptop\u00a0 or and desktop computers.<br\\\/>Taken together both internal and external scans provide a good understanding of your security risks.<br\\\/>\",\"inLanguage\":\"en-GB\"},\"inLanguage\":\"en-GB\"},{\"@type\":\"Question\",\"@id\":\"https:\\\/\\\/forensiccontrol.com\\\/services\\\/vulnerability-scanning\\\/#faq-question-1770810658889\",\"position\":5,\"url\":\"https:\\\/\\\/forensiccontrol.com\\\/services\\\/vulnerability-scanning\\\/#faq-question-1770810658889\",\"name\":\"Why do you offer 12 months of scanning for free?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Security is not a one-time activity, with new vulnerabilities discovered continuously. We include 12 months of scanning with our Cyber Essentials Plus packages so that risks can be identified throughout the year, not just at the point of certification.\",\"inLanguage\":\"en-GB\"},\"inLanguage\":\"en-GB\"},{\"@type\":\"Question\",\"@id\":\"https:\\\/\\\/forensiccontrol.com\\\/services\\\/vulnerability-scanning\\\/#faq-question-1770810690389\",\"position\":6,\"url\":\"https:\\\/\\\/forensiccontrol.com\\\/services\\\/vulnerability-scanning\\\/#faq-question-1770810690389\",\"name\":\"How do these scans support Cyber Essentials?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Cyber Essentials Plus requires evidence that systems are secure and up to date. Our scans identify issues that would cause an audit failure. We help you remediate these issues before assessment, improving first-time pass rates.\",\"inLanguage\":\"en-GB\"},\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability Scanning | Forensic Control | Cyber Security","description":"Forensic Control's Vulnerability Scanning services protect your business from cyber criminals exploiting data breaches and malware","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/forensiccontrol.com\/services\/vulnerability-scanning\/","og_locale":"en_GB","og_type":"article","og_title":"Vulnerability Scanning | Forensic Control | Cyber Security","og_description":"Forensic Control's Vulnerability Scanning services protect your business from cyber criminals exploiting data breaches and malware","og_url":"https:\/\/forensiccontrol.com\/services\/vulnerability-scanning\/","og_site_name":"Forensic Control","article_modified_time":"2026-02-13T11:14:54+00:00","og_image":[{"width":820,"height":462,"url":"https:\/\/forensiccontrol.com\/wp-content\/uploads\/2023\/05\/Secure-your-success.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@ForensicControl","twitter_misc":{"Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["WebPage","FAQPage"],"@id":"https:\/\/forensiccontrol.com\/services\/vulnerability-scanning\/","url":"https:\/\/forensiccontrol.com\/services\/vulnerability-scanning\/","name":"Vulnerability Scanning | Forensic Control | Cyber Security","isPartOf":{"@id":"https:\/\/forensiccontrol.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/forensiccontrol.com\/services\/vulnerability-scanning\/#primaryimage"},"image":{"@id":"https:\/\/forensiccontrol.com\/services\/vulnerability-scanning\/#primaryimage"},"thumbnailUrl":"https:\/\/forensiccontrol.com\/wp-content\/uploads\/2025\/04\/67f3f75c6aba2b3b6c97389f_1-20qr-scan.svg","datePublished":"2025-04-10T16:20:31+00:00","dateModified":"2026-02-13T11:14:54+00:00","description":"Forensic Control's Vulnerability Scanning services protect your business from cyber criminals exploiting data breaches and malware","breadcrumb":{"@id":"https:\/\/forensiccontrol.com\/services\/vulnerability-scanning\/#breadcrumb"},"mainEntity":[{"@id":"https:\/\/forensiccontrol.com\/services\/vulnerability-scanning\/#faq-question-1770810500159"},{"@id":"https:\/\/forensiccontrol.com\/services\/vulnerability-scanning\/#faq-question-1770810534089"},{"@id":"https:\/\/forensiccontrol.com\/services\/vulnerability-scanning\/#faq-question-1770810590589"},{"@id":"https:\/\/forensiccontrol.com\/services\/vulnerability-scanning\/#faq-question-1770810619122"},{"@id":"https:\/\/forensiccontrol.com\/services\/vulnerability-scanning\/#faq-question-1770810658889"},{"@id":"https:\/\/forensiccontrol.com\/services\/vulnerability-scanning\/#faq-question-1770810690389"}],"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/forensiccontrol.com\/services\/vulnerability-scanning\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/forensiccontrol.com\/services\/vulnerability-scanning\/#primaryimage","url":"https:\/\/forensiccontrol.com\/wp-content\/uploads\/2025\/04\/67f3f75c6aba2b3b6c97389f_1-20qr-scan.svg","contentUrl":"https:\/\/forensiccontrol.com\/wp-content\/uploads\/2025\/04\/67f3f75c6aba2b3b6c97389f_1-20qr-scan.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/forensiccontrol.com\/services\/vulnerability-scanning\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/forensiccontrol.com\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/forensiccontrol.com\/services\/"},{"@type":"ListItem","position":3,"name":"Vulnerability Scanning"}]},{"@type":"WebSite","@id":"https:\/\/forensiccontrol.com\/#website","url":"https:\/\/forensiccontrol.com\/","name":"Forensic Control","description":"Cyber Security experts","publisher":{"@id":"https:\/\/forensiccontrol.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/forensiccontrol.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Question","@id":"https:\/\/forensiccontrol.com\/services\/vulnerability-scanning\/#faq-question-1770810500159","position":1,"url":"https:\/\/forensiccontrol.com\/services\/vulnerability-scanning\/#faq-question-1770810500159","name":"What is a vulnerability scan, and why does my business need one?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A vulnerability scan is an automated security check. It scans your network and applications for known weaknesses, such as missing updates or insecure settings. These weaknesses are commonly exploited by attackers. Because new threats appear daily, vulnerability scanning is a key baseline security control.","inLanguage":"en-GB"},"inLanguage":"en-GB"},{"@type":"Question","@id":"https:\/\/forensiccontrol.com\/services\/vulnerability-scanning\/#faq-question-1770810534089","position":2,"url":"https:\/\/forensiccontrol.com\/services\/vulnerability-scanning\/#faq-question-1770810534089","name":"How is a vulnerability scan different from a Penetration Test?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The difference is in its scope and depth. A vulnerability scan is an automated and broad test, designed to identify a wide-range of potential weaknesses. A penetration test by contrast is manual and in-depth, conducted by a security specialist who not only finds vulnerabilities, but confirms whether they can be exploited. A combination of regular (fortnightly or monthly) vulnerability scans and annual penetration tests provides a decent level of reassurance for most organisations.","inLanguage":"en-GB"},"inLanguage":"en-GB"},{"@type":"Question","@id":"https:\/\/forensiccontrol.com\/services\/vulnerability-scanning\/#faq-question-1770810590589","position":3,"url":"https:\/\/forensiccontrol.com\/services\/vulnerability-scanning\/#faq-question-1770810590589","name":"Will it disrupt my team\u2019s work?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"No, it won\u2019t. The scans are non-intrusive, running in the background. Your systems remain stable, and staff can continue working as normal.","inLanguage":"en-GB"},"inLanguage":"en-GB"},{"@type":"Question","@id":"https:\/\/forensiccontrol.com\/services\/vulnerability-scanning\/#faq-question-1770810619122","position":4,"url":"https:\/\/forensiccontrol.com\/services\/vulnerability-scanning\/#faq-question-1770810619122","name":"What is the difference between an Internal and External scan?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"\u2022 <strong>External scans<\/strong> assess systems exposed to the internet, such as routers, from an attacker\u2019s perspective.<br\/>\u2022 <strong>Internal scans<\/strong> assess systems inside of your organisation, such as laptop\u00a0 or and desktop computers.<br\/>Taken together both internal and external scans provide a good understanding of your security risks.<br\/>","inLanguage":"en-GB"},"inLanguage":"en-GB"},{"@type":"Question","@id":"https:\/\/forensiccontrol.com\/services\/vulnerability-scanning\/#faq-question-1770810658889","position":5,"url":"https:\/\/forensiccontrol.com\/services\/vulnerability-scanning\/#faq-question-1770810658889","name":"Why do you offer 12 months of scanning for free?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Security is not a one-time activity, with new vulnerabilities discovered continuously. We include 12 months of scanning with our Cyber Essentials Plus packages so that risks can be identified throughout the year, not just at the point of certification.","inLanguage":"en-GB"},"inLanguage":"en-GB"},{"@type":"Question","@id":"https:\/\/forensiccontrol.com\/services\/vulnerability-scanning\/#faq-question-1770810690389","position":6,"url":"https:\/\/forensiccontrol.com\/services\/vulnerability-scanning\/#faq-question-1770810690389","name":"How do these scans support Cyber Essentials?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Cyber Essentials Plus requires evidence that systems are secure and up to date. Our scans identify issues that would cause an audit failure. We help you remediate these issues before assessment, improving first-time pass rates.","inLanguage":"en-GB"},"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/forensiccontrol.com\/wp-json\/wp\/v2\/post-type\/services\/3533","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forensiccontrol.com\/wp-json\/wp\/v2\/post-type\/services"}],"about":[{"href":"https:\/\/forensiccontrol.com\/wp-json\/wp\/v2\/types\/services"}],"author":[{"embeddable":true,"href":"https:\/\/forensiccontrol.com\/wp-json\/wp\/v2\/users\/16"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forensiccontrol.com\/wp-json\/wp\/v2\/media\/3532"}],"wp:attachment":[{"href":"https:\/\/forensiccontrol.com\/wp-json\/wp\/v2\/media?parent=3533"}],"wp:term":[{"taxonomy":"team","embeddable":true,"href":"https:\/\/forensiccontrol.com\/wp-json\/wp\/v2\/taxonomy\/team?post=3533"},{"taxonomy":"testimonials","embeddable":true,"href":"https:\/\/forensiccontrol.com\/wp-json\/wp\/v2\/taxonomy\/testimonials?post=3533"},{"taxonomy":"case-study","embeddable":true,"href":"https:\/\/forensiccontrol.com\/wp-json\/wp\/v2\/taxonomy\/case-study?post=3533"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}