Network and Web Penetration Testing
Gavin helps companies to simulate attacks against their network, web applications and websites to identify and validate security vulnerabilities and issues.
Approach & Methodology
Gavin is experienced with open source and commercial security tools also used by malicious agents.
Gavin prioritises findings to support effective remediation and risk management.
Supporting Shareholder Values
Ultimately, Gavin helps to protect what matters most, shareholder wealth. He uses his cybersecurity skills to help deter, prevent, detect, and correct unwanted cybersecurity incidents and breaches.
1. What is Cybersecurity?
Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. Source: https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html
2. What is the difference between vulnerability, threat, and risk?
Vulnerability (weakness) is a gap in the protection efforts of a system, a threat is an attacker who exploits that weakness. Risk is the measure of potential loss when that the vulnerability is exploited by the threat e.g. Default username and password for a server – An attacker can easily crack into this server and compromise it. Source: https://www.greycampus.com/blog/information-security/top-cyber-security-interview-questions
3. What is the BEST way to protect my network?
There isn’t necessarily a “best” way. The smartest proven way is to adopt a Defense-in-Depth security approach. A Defense-Depth security approach means implementing security controls at multiple layers of interaction which support each other to protect a computer system.
4. What is a Penetration Test?
A Penetration Test is an authorised simulated attack on a computer system to identify security weaknesses so they can be improved.
5. What is the difference between a Black Hat and a White Hat hacker?
Black Hat hackers are those who hack without authorisation. White Hat hackers are authorised to perform hacking exercises. Grey Hat hackers are White Hat hackers which sometimes perform unauthorised hacking activities.
6. Do you Freelance?
Currently, no, but I do volunteer my skills to help companies and people who contact me with issues. My volunteerism provides great value as it allows me to be completely unbiased in my support and everyone seems to really appreciate that.