{"id":5399,"date":"2018-12-28T19:44:54","date_gmt":"2018-12-28T19:44:54","guid":{"rendered":"https:\/\/hackmethod.com\/?p=5399"},"modified":"2019-01-03T15:52:10","modified_gmt":"2019-01-03T15:52:10","slug":"5-things_penetration-testing","status":"publish","type":"post","link":"https:\/\/hackmethod.com\/5-things_penetration-testing\/","title":{"rendered":"5 Things You Should Know Before Hiring Professionals For Penetration Testing"},"content":{"rendered":"\n<p>Whether you\u2019re in a small business or in a multi-million dollar company, you\u2019d surely want to fortify and maintain your networks physical and IP security by having penetration testing. There may be a lot of pentest companies and professionals out there, but hiring what suits your needs might not be as simple as it sounds.<\/p>\n\n\n\n<p>Pentesting will involve critical procedures such as allowing these professional\u2019s permission to verify and test your existing and new systems, applications, safeguards, and networks that don\u2019t provide unwarranted access to malicious third parties \u2014 but pentest companies and individuals can range from being helpful, thorough, and razor-sharp to negligent, irresponsible, and oversold.<\/p>\n\n\n\n<p>With today\u2019s hackers being more sophisticated than ever, hiring a company such as <a href=\"https:\/\/www.alpinesecurity.com\">Alpine Security penetration testing<\/a> will be your best bet against these cyber criminals. <\/p>\n\n\n\n<p>With that, here are 5 things you need to know before hiring professionals for penetration testing:<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1. Communication skills<\/h2>\n\n\n\n<p>Having a pentest company with excellent communication skills is critical, that is why they must be able to: <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Communicate easily with high-level concepts and technical discussions depending on their audience. <\/li><li>Demonstrate their communication skills competency, both spoken and written, as test results would only be useful if it\u2019s well written and well understood.<\/li><li>Produce high-quality reports and explanations of their findings in a detailed manner at non-technical and technical levels.<\/li><li>Communicate the results in a non-technical level that the business management can comprehend.<\/li><\/ul>\n\n\n\n<p>For example, if a pentester with <a href=\"https:\/\/www.alpinesecurity.com\/training\/eccouncil\/advanced-penetration-testing-apt\">advanced penetration testing training<\/a> finds a serious technical exploit on your system, his or her report will be well explained and outlined for you to easily understand its importance or value.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">2. Ethical hacking passion<\/h2>\n\n\n\n<p>Ethical hackers as any other professionals should be passionate about their work.  If not, the results would be ineffective and inefficient.<\/p>\n\n\n\n<p>When interviewing a candidate, ask about what they will do when they\u2019re not on the job. Their answers would likely reflect the importance of penetration testing to them. Passionate ones will also be personally driven to improve your network&#8217;s security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3. Pentest experience<\/h2>\n\n\n\n<p>Although this job is hard to get into, as no individual or company will likely accept a candidate without prior experience.  There will always be individuals or companies posing as expert pentesters. This is where a client references can be a good resource to check.<\/p>\n\n\n\n<p>Upon confirming, ask them if they had previous administrative experiences and primary roles on penetration testing.  Having these is a good sign of a legitimate candidate.<\/p>\n\n\n\n<p>The thin line that separates a \u201cgreat\u201d and a \u201cgood\u201d pentester will be their situational awareness, as a benefit of having a more profound knowledge of how networks and systems work \u2014 that can only be gained from previous network and system administration experience.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">4. Security community involvement<\/h2>\n\n\n\n<p>Have you ever heard about a hacker conference? Maybe you\u2019ve seen it once or twice on the news or heard about them in passing. but these conferences and communities will involve legitimate candidates who can protect your business from cyber-terrorists.  <\/p>\n\n\n\n<p>If you\u2019re looking for solid candidates, you can as well start in participating in local IT security chapters, or in development projects in open source <a href=\"https:\/\/hackmethod.com\/personal-computer-security-basics\/\">security<\/a> tools such as OWASP, GitHub, and etc. <\/p>\n\n\n\n<p><a href=\"https:\/\/mm.netsecfocus.com\/\">Infosec community<\/a> involvement can allow employers to start building relationships with potential employees, and have a better understanding of how a pentest works.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">5. Company or individual reputation<\/h2>\n\n\n\n<p>It can give you the impression of providing the most dangerous person a blueprint of your company\u2019s system and networks, and allow them to exploit its weaknesses; this is the reason why reputation is essential when hiring a pentester.<\/p>\n\n\n\n<p>Look for pentesters who have <a href=\"https:\/\/mm.netsecfocus.com\/\">InfoSec community<\/a> association, and involvement in conferences such as DEFCON, DerbyCon, and ShmooCon. Additionally, you can also check their open source project contributions and blog articles. These will obviously show their passion and enjoyment in penetration testing.<\/p>\n\n\n\n<p>However, experts say that big ego pentesters may undervalue your company\u2019s security over their bragging rights; this why when your looking for candidates don\u2019t always go for the most popular ones. Finding a systematic and thorough penetration tester may provide more efficient and effective results than a famous \u201cstunt hacker.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Closing Thoughts<\/h2>\n\n\n\n<p>With all that said and done, use this article as a guide when hiring a professional penetration tester, as this is an essential part of any organization\u2019s security plan. Whether you\u2019re performing a pentest for the first time or on a planned maintenance schedule, it can surely increase the company\u2019s awareness and defenses on potential cybersecurity breaches.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Whether you\u2019re in a small business or in a multi-million dollar company, you\u2019d surely want to fortify and maintain your networks physical and IP security by having penetration testing. There may be a lot of pentest companies and professionals out there, but hiring what suits your needs might not be as simple as it sounds. [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":5402,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[74,52,63],"tags":[],"class_list":["post-5399","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-hacking","category-security"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/hackmethod.com\/wp-content\/uploads\/2018\/12\/shutterstock_1043805787.jpg?fit=500%2C334&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p5zY4D-1p5","_links":{"self":[{"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/posts\/5399","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/comments?post=5399"}],"version-history":[{"count":3,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/posts\/5399\/revisions"}],"predecessor-version":[{"id":5404,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/posts\/5399\/revisions\/5404"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/media\/5402"}],"wp:attachment":[{"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/media?parent=5399"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/categories?post=5399"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackmethod.com\/wp-json\/wp\/v2\/tags?post=5399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}