Critical National Infrastructure (CNI) is vital to national wellbeing, ensuring that essential services continue to operate at all times. Under the NIS Regulations, CNI operators have a legal duty to make sure that IT systems are fully protected in the event of a cyberattack, and that they have plans in place to respond effectively to an incident.
CNI penetration testing puts people, processes and technology under scrutiny. Using the same tools and techniques as hackers, CHECK-certified consultants will attempt to breach network defences to expose vulnerabilities that require urgent attention.
Penetration testing is essential
Identifying and resolving network vulnerabilities is crucial to protecting CNI resources. It is only when these systems are put to the test that security issues are uncovered.
To achieve compliance
CNI operators are bound by the NIS Regulations – but they must also comply with GDPR and various PSN CoCo agreements. Failure to comply could result in significant fines or loss of access to critical infrastructure services.
CNI operators are subject to routine security audits. Conducting penetration testing allows you to identify and resolve issues before the audit, reducing the risk of failing compliance testing.
Validation of incidence response planning
As cyberattacks increase in frequency, your incidence response plans will be called into action – and soon. Penetration testing allows you to safely assess plan effectiveness, and fine-tune processes before they are needed.
CHECK qualified engineers ‘attack’ your firewall and network assets to identify vulnerabilities that may be exploited by hackers. Using the same tools and techniques they do, we will help you understand the strengths and weakness of your security technologies.
Physical security testing
Cybercriminals may gain access to your network by first visiting one of your sites. Fidus engineers will test the systems and processes that control physical access to your sites and ensure that access control safeguards are being properly applied.
Phishing and social engineering tests
People will always be the weak point in your security systems. Fidus engineers conduct social engineering attacks to assess how well your staff respond and where additional training is required.
Red Team scenarios
Conducting a full-scale Red Team cyberattack on CNI network systems allows you to assess how people, processes and technology really work together in an emergency.
Penetration testing reveals your most sensitive network vulnerabilities – so you need a partner you can trust. Fidus Information Security are an NCSC CHECK Green Light and TIGER scheme approved consultancy. Our cyber security experts hold some of the most recognised certifications in the industry, including CREST Certified Tester and Senior Security Tester. Fidus is also a Cyber Essentials verified company. Every assessment we perform is carried out according to UK industry approved methodologies (OWASP, PETS, NIST) along with our own internal testing frameworks.
More than just identifying security vulnerabilities, our cyber security experts are on hand to help you fix them too.
Certified Security Consultants
Our CREST and TIGER approved team holds a range of industry-leading security certifications including OSCP, CCT, SST and CISSP
Easy to Understand Reports
We’ll ensure that your executives and technical teams properly understand our assessment findings using plain-English reporting.
Fixed Price Proposals
The price you’re quoted is the price you’ll pay. Our quotes are broken down into a detailed costing table so you know exactly what to expect.
Other approaches we've witnessed have included convoluted steps and commonly ends with incorrect information being handed to the consultant assigned to the engagement.
Our approach to security involves a qualified security consultant through the entire process to ensure quality, accuracy and consistency.
Introduction Fidus’ R&D team identified a vulnerability within Virgin Media Super Hub 3 routers that permitted for exfiltration of sensitive information remotely, which, among other things, can be used to determine the actual, ISP issued IP address of VPN users. A vulnerability we were asked to hold back from releasing for a whole year. A […]
Introduction Quiplash – a game full of wit, banter and borderline acceptable humour… and security consultants on a lunch break. To set the scene, the date was 19th February 2020 and the mood was cheerful in the Fidus office. Lunch had just been delivered and today was the day that Mario Kart was not going […]