Have a Question?

What is a Vulnerability Assessment?

You are here:
< All Topics

A Vulnerability Assessment provides you with a high-level overview of potential security weaknesses.

Vulnerability assessments can be conducted by an internal security team or by an external team to provide an independent view. They are a key component of a security strategy, and can help to validate the effectiveness of processes and technology currently in place and identify opportunities to improve.

Typical vulnerabilities include missing operating system patches, outdated software, obsolete operating systems, default credentials and many other cyber-security weaknesses that may be very quickly identified by malware or an attacker who has already gained physical access to your network.

Once identified, an organisation can develop a prioritised action plan to remove or manage vulnerabilities. Assessments should then be conducted on a regular basis and remaining or new vulnerabilities addressed, ensuring vulnerability management on an ongoing basis.

Was this article helpful?
0 out of 5 stars
5 Stars 0%
4 Stars 0%
3 Stars 0%
2 Stars 0%
1 Stars 0%
How can we improve this article?
Please submit the reason for your vote so that we can improve the article.