Skip to main content

What is a Compromised Assessment Test?


 

A Compromise Assessment Test is a hunting test for suspicious activities on every layer of the suspected network to detect unknown security breaches, malware, and signs of unauthorized access. More specifically, the assessment seeks to find attackers currently in the environment or who have been active in the recent past.

Over the years, compromise assessments only existed in limited forms as specialized services.

Due to the rapid growth of disclosed breaches that reached a fevered pitch, organizations need to adopt an “assumption of breach” mentality to intensify their efforts in maintaining the effectiveness of their cyber defenses.

HOW DOES IT WORK?

To be universally applicable, the compromise assessment should be:

  • Practical — Detecting all known variants of malware, remote access tools, and indications of unauthorized access using advanced offerings and solutions should have the ability to go deeper into the detection of unknown (zero-day) malware variants as well.
  • Fast — Assess network within hours/days.
  • Affordable — The average organization should be able to conduct it proactively and regularly

For solid protection, the executed compromise assessment test should be efficient enough to run at least once a month for the average-sized organization and seek to optimize time, cost, and effectiveness.

Ultimately, the goal of the assessment is to rapidly identify hostile activity or malicious logic — not to perform a complete forensic examination. After completing and assessing the collected evidence, recommendations should be made for a proper response, and collected evidence should be packaged for the organization to allow the testers to investigate the root cause or actors behind the attack.

It is worth noting that the cyber compromise assessment test goes beyond discovering hostile activities; it has a broader scope in general. It also identifies the existing gaps, vulnerabilities, misconfigurations, excessive privileges, and other security issues. It can be used in combination with a penetration test, but it is not a substitute. The pen test reveals vulnerabilities that could lead to a potential compromise, encouraging you to implement protective measures; meanwhile, the cybersecurity compromise assessment reveals active threat vectors present in your environment.

To know more about Compromise Assessment Test, request a meeting with our experts for a free demo assessment: https://teknologiia.com/request-a-meeting/.



Originally published at Mazen N. Daccache | LinkedIn

Comments

Popular posts from this blog

[Update] Twitter down, not working on Android | How to fix Twitter crashing issue | DigiStatement

In our earlier posts, we reported that a lot of users are posting about the crashing issue with the Twitter app on the Android platform. Some users posted that the app is not opening after updating it to the latest version on Google Play Store, while some reported that they are using the older version of the Twitter app and still facing the crashing issue. Well, Twitter officially acknowledged the issues with the Android app of Twitter and posted an update with the official account of Twitter Support. In the tweet, Twitter also suggested its users to not update and download the latest version of the app. You can check out the official tweet below. How to fix Twitter crashing issue - If you are still using the older version of the Twitter app, first you need to turn off the auto-update feature in the Google Play Store. For this, go to the Play Store app then head to Settings > Auto-Update Apps > Don’t Auto-Update Apps . You can enable this feature later, as it will s...

Scraped data of 500 million LinkedIn users being sold online, 2 million records leaked as proof | CyberNews

  Updated on 07/04: We updated our personal data leak checker database with more than 780,000 email addresses associated with this leak . Use it to find out if your LinkedIn profile has been scraped by the threat actors. Days after a massive Facebook data leak made the headlines, it seems like we’re in for another one, this time involving LinkedIn. An archive containing data purportedly scraped from 500 million LinkedIn profiles has been put for sale on a popular hacker forum, with another 2 million records leaked as a proof-of-concept sample by the post author. The four leaked files contain information about the LinkedIn users whose data has been allegedly scraped by the threat actor, including their full names, email addresses, phone numbers, workplace information, and more. To see if your email address has been exposed in this data leak or other security breaches, use our personal data leak checker with a library of 15+ billion breached records . While users on the hacker foru...

Facebook bows to Singapore's 'fake news' law

Facebook has added a correction notice to a post that Singapore’s government said contained false information. It is the first time Facebook has issued such a notice under the city-state’s controversial “fake news” law. Singapore claimed the post, by fringe news site States Times Review (STR), contained “scurrilous accusations”. The note issued by the social media giant said it “is legally required to tell you that the Singapore government says this post has false information”. Facebook’s addition was embedded at the bottom of the original post, which was not altered. It was only visible to social media users in Singapore. Singapore passes controversial fake news law Concern over Singapore’s anti-fake news law Singapore: What you need to know In an emailed statement to the BBC, Facebook said it had applied a label to a post “determined by the Singapore government to contain false information”, as required under the “fake news” law. The company — which has its Asia ...