Questions? Contact Us


Latest News

Featured News & Events

The importance of vulnerability scanning

In a world where the threat of a data breach is ever evolving, securing complicated IT networks is critical to a business' ability to meet industry data security requirements. Even if your company has tested your IT system's security defenses in the past, maintaining this security is a continuous process.

Each time your system is updated and upgraded, your business should assess the threat to its network. Vulnerability scanners are an effective way of identifying devices on your network that are open to known and potential vulnerabilities.

What is Vulnerability Scanning?

A vulnerability scan is exactly what it sounds like: a software program that compares a company's operating systems, networks and applications against proprietary or public databases of known vulnerabilities. There are two types of scans: internal and external. An external vulnerability scan searches for holes in a network's from the internet. An internal scan operates inside a business' firewalls to assess real and potential vulnerabilities within the network.

Vulnerability scans provide reports on detected gaps in security and recommendations for security patches or vendor solutions. A report will also describe the types of vulnerabilities or risks found and a potential cause for each vulnerability. In accordance with the PCI Security Standards, scans assign vulnerabilities a numeric rating of 1-5. Those ratings are defined as follows:

  • Level 1 – low risk where hackers can obtain information on configuration.
  • Level 2 – medium risk where hackers can obtain sensitive configuration information.
  • Level 3 – high risk where a hacker could conduct directory browsing or a limited exploit of read.
  • Level 4 – critical risk including potential Trojan horses and file read exploits.
  • Level 5 – urgent risk including confirmed Trojan horses, files read and write exploits and remote command execution.

The critical difference between a vulnerability scan and a penetration test, another security measure required under PCI standards, is that one is active and one is passive. Vulnerability scans assess the potential for risk using automated tools, while in a penetration test an IT professional actively tests a network's defenses through manual exploitation. Both measures help ensure maximum data security.

What it means

So what does a vulnerability scan really tell you? It gives you a precise look at all identified vulnerabilities, and potential vulnerabilities, that are often only targeted by hackers.

Business learn through vulnerability scanning about the consequences and risks involved with each identified vulnerability and proposed actions to close security gaps. Think of it like a required physical. A person can't take action to improve his health until he knows what's wrong. It takes a doctor to identify early signs of health risks, much like it takes a vulnerability scan to assess silent IT threats.

ZZ Servers Vulnerability Scanners are designed to help merchants successfully comply with PCI data security guidelines. ZZ Servers can customize its scanning service, including internal and external network scans, to meet the specific needs of any business. Our automated remote probe uses a signature database of more than 3,500 vulnerabilities to assess the risk to your business. We provide web-based reports delivered securely to any web browser, and we offer recommendations and consultation for remediation of vulnerabilities.

Has your network had a check-up lately?

World Backup Day: Have you backed up your data lat...
Why it matters where you host your website

Related Posts


Tag Cloud

passwords network ICANN vulnerability scanning cyber security HIPPA spf HIPAA follow.The HIPAA Privacy Rule PCI compliance amazon ec2 members area PCI DSS 3.2 vyatta router firewall filter security PCI HIPAA IT Services Internet David Zendzian PCI Solutions intrusion detection qsa IT services Business Solutions TiaraCon support Email business community data protection Sysadmin Cybersecurity OSSEC cloud infrastructure Positive Customer Impact security Firetalk computer security kerio phishing trends Medical Records Health Insurance Portability management businesses cli Health Care Cybersecurity business solutions windows 7 DEF CON shared secure hosting assesment physical bash Payment Card Industry cyber monday security circles Security Geekend Credit Card Security change Online Business QSA caller-id Continuous Monitoring Credit Cards logical security phishing attacks permissions education PCI Audit hosting control panel Web Hosting iphone Cloud Computing information technology Information Technology computing in the cloud cyber ZZ Servers dss lamp HIDS employee training Hosting black friday Small Business sender policy motivation Las Vegas Car Hacking VPS Servers physical security INFOSEC smartphone compliance InterWorx IT HIPAA solutions command line IT security Scalable Redundant Cloud Infrastructure safe computing Debian credit card payment Presentation SSL credit cards stolen recovering data cell phone email Internet Corporation Xen shared hosting multi-factor authentication PCI Service Provider Announcement BSides spam Ubuntu PCI Hosting Assigned Names Control Panel healthcare solutions embedded PCI Compliance dsbl backup solutions TLS IT solutions search Business Planning eCommerce Alarm anti virus Charleston vps Cybersecurity Business Solutions CentOs Server Mangement data breach cyber liability insurance cybersecurity ZZ Servers Co-Founder apache password Internet infrastructure compliant hosting Medical Solutions health care providers credit card social engineering IT Solutions pci complliant hosting Accountability Act malicious software arduino Zendzian Vulnerability teensy mail server Reports video Interworx-CP shared folders Home Depot Breach spoofing World Backup Day business solitions log files Compliance business Disaster Recovery Plan exchange PCI Data Security Standards data privacy cyber monitoring Healthcare Records infrastructure National Cyber Security Awareness Month DRP openssl two factor authentication Windows cyber protection HIPAA Solutions Hackers small business shared server personal information protect data cloud Domani Names PCI GDPR computer networks eCommerce Solutions ipad activesync Shmoocon blackberry Linux email accounts