There are several types of security surveys that organisations can conduct to protect their systems, networks and applications from threats. Each of these methods has a specific focus and provides valuable insights into weaknesses and vulnerabilities within a security infrastructure. Pentesting or penetration testing is a more in-depth and hands-on approach than automated scanning, for example, where hackers attempt to actually break into a system. The aim is to discover whether vulnerabilities can be exploited and to simulate how a real attacker would proceed. Pentests are indispensable for organisations that take their security seriously. They not only help detect and fix vulnerabilities, but also ensure compliance, data protection and trust among customers and partners. Regular testing and improvement is the key to a strong security strategy.
Strengthen your Cyber Security with Structured Penetration Testing according to MIAUW
At a time when cyber threats are constantly evolving and laws and regulations place increasingly stringent requirements on the digital resilience of organisations, it is essential to thoroughly evaluate the security of your IT systems. Our penetration tests, conducted according to the Method of Information Security Assessment with Audit Value (MIAUW), provide a structured and transparent approach to identify and remediate vulnerabilities in your systems.
Why is MIAUW important?
MIAUW is an open-source methodology that provides a standardised approach to conducting penetration testing. This methodology emphasises transparency, reproducibility and quality, giving you as an organisation insight into the security status of your IT environment. We stood at the foundation of Meow to arrive at this methodology with many others. In fact, the methodology’s logo is the effigy of Otis: one of Brenno de Winter’s cats. This is not without reason, as MIAUW is needed to give clients back control over the process of technical review without having to be a techie themselves.
Our Services
We offer penetration testing for various components of your IT infrastructure, including:
-
Web applications: Web applications such as websites, financial systems and portals are the gateway to your data and even your internal infrastructure. A pen test helps find threats and provides you with insight into whether the web application’s foundation is sufficient.
-
Infrastructure: A pen test targeting your corporate network reveals whether criminals can penetrate your internal or external (Wi-Fi) network. It also reveals whether ransomware or your employees can compromise data. By looking at the technical setup, testing for key points and providing insight into the setup, it becomes clear whether the technical environment meets minimum standards or, on the contrary, basic problems pose a threat to you.
-
APIs: Mobile apps and APIs process a lot of user data and are therefore very sensitive systems. A pen test can test an app or API extensively in advance. This way, security issues do not become known only after launch.
-
OT environments: A pen test can reveal sensitivities in your Industrial Automation and Control Systems (IACS) and Operational Technology (OT) environments. For example, think of ICS/SCADA, HVAC, SIS, firewalls, gateways or communication systems. In many cases, we see environments, which have not been designed with the Internet as a key driver, or have been designed inadequately, which can make these environments a digital Trojan horse.
Why Choose Our MIAUW-Compliant Penetration Testing?
-
Structured Approach: Our methodology ensures a consistent and thorough assessment of your systems.
-
Transparency: Clear documentation and reporting provide insight into findings and recommendations.
-
Reproducibility: The established methodology allows studies to be repeated consistently, which is important for validating results and monitoring improvements.
-
Audit value: Our reports are suitable for audits and help you comply with laws and regulations such as the NIS2 guideline.
The Role of Directors in Cybersecurity
Recent legislation, such as the NIS2 directive, emphasises the responsibility of directors for their organisation’s cyber security. Directors are expected to be “in control” and can be held personally liable for security failures. A structured penetration test according to MIAUW provides directors with the necessary insight and assurance that their organisation meets the security requirements set.
Our Approach
We follow a clear process that starts with an intake to determine the objectives and scope of the test. We then prepare a detailed Plan of Approach and conduct the penetration test using both manual and automated techniques. Upon completion, you will receive a comprehensive report with findings, risk assessments and concrete recommendations for improvements.
Contact us
Want to take the security of your IT systems to the next level and comply with the latest standards and regulations? Then take contact us with us for more information on our MIAUW-compliant penetration tests. Together, we will ensure that your organisation is resilient against the cyber threats of today and tomorrow.