Network Security Scanning

Vulnerability scanning is an inspection of the potential points of exploit on a computer network to identify security holes.

A vulnerability scan detects and classifies system weaknesses in computers, networks and communications equipment and predicts the effectiveness of countermeasures. A scan may be performed by an organization’s IT department or a security service provide, possibly as a condition imposed by some authority. Approved Scanning Vendors (ASV) are service providers that are certified and authorized by the Payment Card Industry (PCI) to scan payment card networks. Vulnerability scans are also used by attackers looking for points of entry.

Vulnerability scanning is an inspection of the potential points of exploit on a computer or network to identify security holes. A vulnerability scan detects and classifies system weaknesses in computers, networks and communications equipment and predicts the effectiveness of countermeasures.

In response to vulnerability scanning, below are a few of the methods we implement to protect our clients data.


  • Maintain offline, encrypted backups of data and regularly test backups.
  • Create, maintain, and exercise a basic cyber incident response plan and associated communications plan.
  • Mitigate internet-facing vulnerabilities and misconfigurations to reduce the attack vector.
  • Reduce the risk of phishing emails from reaching end users by tuning spam filters and implementing user awareness in the form of regular training programs.
  • Practice good cyber hygiene by using up-to-date anti-malware solutions and applications, enable MFA, and limit the number of privileged accounts.