〈   Technology and Protection
Solutions and technologies geared to SMEs

Chapter 1.6

Vulnerability scans

When employees are not implicated, cyberattacks are often the result of the exploitation of a software or IT vulnerability. Therefore, it is worth performing vulnerability scans in order to detect vulnerabilities, vulnerable services or missing updates.

Vulnerability scans can be done internally or externally.

2023 © Trust Valley. All rights reserved.