Everything we get asked most weeks.
Common questions about penetration testing, assessments, compliance, and how an engagement actually runs. Don't see yours? Send us a message.
What is a penetration test?
A penetration test (or "pen test") is a method for evaluating the effectiveness of an organization's security controls. Testing is performed under controlled conditions, simulating scenarios representative of what a real attacker would attempt. When gaps are identified, a pen test goes beyond basic vulnerability scanning to determine how an attacker would escalate access to sensitive information assets — financial data, PII, intellectual property — and produces a report with detailed findings and concrete remediation guidance.
What's the difference between a vulnerability scan and a penetration test?
Vulnerability scans are automated and broad: they find known weaknesses against a database of CVEs and configuration issues. They're fast, repeatable, and great for ongoing hygiene. Penetration tests are manual and deep: a senior tester chains exploits the way a real attacker would, finding business logic flaws, custom code vulnerabilities, and zero-day-class issues that scanners can't see. Most organizations need both — scanners for continuous visibility, pen tests for periodic depth.
Will penetration testing disrupt our environment? Will systems go down?
Properly planned and coordinated, no. Disruption only happens when planning is rushed. We invest meaningful time up front to scope safely, identify risk areas, and coordinate testing windows with your team. Communication and monitoring continue throughout the engagement so we can pause or adjust if anything unexpected appears.
What's the difference between ethical hacking and other types of hacking?
Ethical hacking is performed under explicit written authorization, within a defined scope, by professionals whose goal is to improve security. The techniques used by ethical hackers can overlap with those used by attackers — but the legal authorization, scope, and intent are categorically different. Findings are responsibly disclosed only to the client and used to drive remediation.
How long does an engagement typically take?
A focused engagement (e.g., a single web application pentest or external network test) usually takes 1-2 weeks of active testing plus a week of reporting. Larger engagements (full internal + external network + applications) typically run 3-6 weeks. We size every engagement to the actual environment — no minimum-billable-hour padding.
What deliverables do we receive?
A detailed technical report with every finding ranked by exploitability, evidence (screenshots, request/response captures), and concrete remediation guidance your engineers can implement. An executive summary written for non-technical stakeholders. A debrief call to walk through the findings and answer questions. Optional: a follow-up validation test after you've remediated.
Do you help with compliance frameworks like HIPAA, PCI DSS, NAIC, or SOC 2?
Yes. We run framework and gap assessments specifically against the controls auditors check, and our standard pen test reports map findings to the relevant control families. We don't certify compliance — that's the auditor's role — but we get you audit-ready and identify the gaps that would otherwise become findings.
Can you provide ongoing security support, not just one-time engagements?
Yes — we offer Virtual CISO (vCISO) engagements, ongoing advisory retainers, and outsourced security operations. The right shape depends on your environment and team. A 30-minute scoping call is the fastest way to figure out what you actually need.
What industries do you work with?
We've delivered engagements across healthcare, education (K-12 and higher ed), fintech, professional services, manufacturing, and SMB technology companies. The methodology is the same; the scoping changes based on regulatory and operational context.
How do we get started?
Book a 30-minute call directly on our calendar. We'll talk through your environment, your concerns, and any deadlines (compliance, board reporting, vendor requirements). At the end of the call, you'll have a recommended starting engagement and rough timeline. No pressure, no slide deck.
Talk to us directly.
A 30-minute scoping call answers most questions faster than email. No pressure, no slide deck.
- No high-pressure follow-up
- Scoping notes delivered within 24 hours
- NDA available before the call