Risk Report
- What is a Risk Report?
- What's the Difference between a Perimeter Report and an Intrusion/Penetration Test?
- My client's website doesn't contain sensitive data. Are the vulnerabilities still valid?
- How do we get the Cyber Risk Report Data?
- What to Do If a Report Fails to Generate
- Which vulnerabilities are considered elevated?
- How do I check if an Insured's vulnerabilities have been successfully remediated?
- How long does it take for new data to be discovered by the scan after updates are made to the domain?
- This host is not managed by the Insured, or is hosted by a 3rd party. Is this vulnerability still valid?
- How are you detecting the hosts in this report?
- Remote Access Section Guide
- Hosting Security Section Guide
- Website Security Section Guide
- Exposed Data Section Guide