Cyber attacks, and ransomware attacks, in particular, are on the rise, and this troubling trend is likely to continue. Having an effective incident response plan in place is vital for protecting your organization and its digital assets, but even the best plan is only as good as the facts that inform it.
To create a solid incident response plan, you need specific, actionable information about your current cybersecurity posture. A vulnerability scan gives your cybersecurity team invaluable insight into your current cybersecurity posture’s weaknesses or deficiencies so those cracks in your armor can be addressed before cybercriminals are able to use them against you.
What is a Vulnerability Scan?
A vulnerability scan involves having trained cybersecurity experts evaluate your IT infrastructure for software and firmware vulnerabilities, as well as evaluate all devices that connect to your network for configuration issues that pose security gaps. Using this valuable information, your cybersecurity team or partner can develop strategies and solutions to address these shortcomings before cybercriminals are able to leverage them and sneak past your defenses.
Whether you opt for a one-time engagement scan or ongoing vulnerability scanning as part of a larger suite of managed services (such as managed SIEM), a vulnerability scan is a critical component of any robust cybersecurity posture.
What Should All SMBs Look for in their Vulnerability Scans?
What weaknesses your vulnerability scan will look for will vary slightly between organizations, but all comprehensive scans should assess your systems for:
Software vulnerabilities are the most common vulnerability discovered. This type of scan involves checking for known weaknesses in all the third-party hardware and software your system relies on. These known weaknesses are discovered by security researchers and typically only pose an issue in select versions of particular technologies.
When software engineers employed by software companies discover a vulnerability or other issue in their code, they create security patches (small corrective snippets of code) to address the issue. However, you can only take advantage of the security patch if you download it, which is one of the many security reasons you should be keeping your software up to date. Cybercriminals frequently try to exploit known vulnerabilities in recently patched software in the hope that not all organizations are as studious as yours about keeping their software up to date.
Web Application Vulnerabilities
Another common type of vulnerability cybercriminals often seek to exploit are security gaps in web applications, which can be used to gain unauthorized access to sensitive data, compromise your web server, or attack web application users.
Whether you are using third-party applications designed by other companies or proprietary in-house applications, make sure any vulnerability scan you commission includes web application vulnerability scanning.
Common Misconfigurations & Mistakes
Sometimes the issue isn’t the software or the hardware, but the people using it or configuring it. Incorrectly configured software can inadvertently leave your entire system vulnerable, and you may not even realize it.
Not following established security best practices can also leave your network vulnerable. After all, investing in a high-quality, unbreakable lock is only useful if you don’t leave the key under the mat (or your password written on a sticky note under your keyboard).
Make sure you have security best practices in place and that those practices are effectively communicated to all network users. Investing in employee cybersecurity training can not only help curtail network vulnerabilities but can also help secure your network in other ways by making it less likely employees will fall for phishing scams (or other social engineering based attacks). Security-minded employees are also better able to identify potentially suspicious activities (such as strange network traffic), so they can alert your security team.
Encryption Configuration Weaknesses
A good vulnerability scan will also assess the encryption configurations used to safeguard data in transit between your users and your servers.
When looking for encryption configuration weaknesses, make sure your scan is looking for issues with SSL/TLS (secure sockets layer/transport layer security) implementations, such as weak encryption ciphers (easy to guess passwords), SSL certificate misconfigurations, and the unintentional use of unencrypted services such as FTP (file transport protocol).
Attack Surface Reduction
An effective strategy for improving your cybersecurity posture is to limit your attack surface area. You should only publicly expose core services or systems if you absolutely have to, and those exposed surfaces should be continuously monitored for suspicious activities. When choosing a vulnerability scanner, make sure you select one that assesses your attack surface area for issues such as unprotected ports and services that are exposed to the wider internet. Examples of vulnerable attack surfaces include exposed databases, exposed administrative interfaces, and sensitive services such as SMB (server message block).
Information leaks involve exposing information to end users when that data should remain private.
In addition to assessing your system, the final report of your vulnerability scan should include both the weaknesses discovered (in plain, accessible language so that even non-technical team members are able to understand what was discovered) as well as concrete, actionable recommendations for remedying the situation. When it comes to cybersecurity, information is only useful if it can be easily understood and actioned upon. That’s why it is vital you choose a cybersecurity partner whose goal is to educate and inform your team and help you improve your cybersecurity posture.
Not all vulnerability scans will include checks in all of the above categories, and the quality and number of checks a scan includes will vary between organizations. As such, it is critical to do your research before conducting a scan, particularly if you are opting for a paid option, to ensure the scan will meet your needs.
Free vs Paid Vulnerability Scanning
User Beware: “Free” Doesn’t Always Actually Mean Free
Also, the term “free” can vary from scanner to scanner, with some offering a free trial, a free version for non-commercial use only, or limited functionality at the free tier. As such, make sure you are clear about what the free version does and does not include before you sign up and do your research to ensure the free scan will actually give you the information you need in a format you can actually use to improve your security posture.
Just Because You Aren’t Paying with Money Doesn’t Mean There Isn’t a Cost
When it comes to many “free” vulnerability scans, you may not be paying with money, but there is still a cost. These tools are often limited in scope, so you likely aren’t getting the whole picture. This can lead to a false sense of security as you metaphorically check that the front door is locked while leaving the back door wide open.
As you will soon see, these tools are also frequently not very user friendly (at least for individuals who aren’t already technology experts), which can mean either hiring a tech expert just to perform your free scan or setting time and personnel aside to learn how to use this product, pulling them away from critical tasks. Free software is typically developed on an extremely limited budget, and UX design is often an “extra” that is left out, making it difficult for even the most technically inclined to get useful information out of these tools.
Free vulnerability scans are also not carried out by teams of experts and are frequently just tools you can use to assess select aspects of your infrastructure on your own, so even the most comprehensive versions will still require your team to take the information they have gathered and turn it into actionable suggestions.
Paid options are almost always more user-friendly and typically come with ongoing support and guidance. They are more likely to offer a polished, easy-to-understand report detailing what vulnerabilities were discovered, as well as actionable advice on how to address these issues and improve your security posture.
Top 4 Free Vulnerability Scanning Tools (& What They Can Tell You)
While paid vulnerability scan options typically yield more detailed and in-depth information (and cover a wider range of checks), free scanning tools can help small organizations on a tight budget assess specific areas of their networks (such as their web applications or security patches).
However, these scanning tools tend to be limited in scope, so you may need to run several in order to piece together a full list of all vulnerabilities on your network.
Burp Suite (Owned by PortSwigger)
Burp Suite is a popular web vulnerability scanner used by a variety of organizations and offers a free version (referred to as their Community Edition). However, this free version has limited functionality and does not include automation capabilities. This version contains essential manual tools and is mostly aimed at researchers and hobbyists.
Burp Suite is Java-based and can be used to check for SQL injections, cross-site scripting (XSS), and other web vulnerabilities, as well as for security auditing and compliance purposes.
Nmap bills itself as a pen-testing tool but works more as a port scanner. Nmap scans your network and flags ports that are vulnerable, which can aid in pen-testing. In addition to port scanning, Nmap can also look for other vulnerabilities in your systems and networks, monitor host uptime, service uptime, and map network attacks when they occur. By pointing out potential weaknesses, it has its strengths as an auditing tool, but it isn’t able to actually show users how the vulnerabilities it discovers could be penetrated.
Nmap is an open-source tool aimed at ethical hackers looking for network weaknesses. Like all open-source software, Nmap is free, but like other open-source programs, it isn’t particularly easy to use unless you are already familiar with using open-source software.
Wireshark is a well-known open-source network protocol analyzer designed to help with select network vulnerability scanning tasks. It relies on packet sniffing to understand your network traffic patterns, which is useful for network administrators looking to design effective countermeasures.
By detecting suspicious network traffic, Wireshark can help you discover errors and detect if an attack is underway, categorize the attack, and help you implement rules to protect your network. However, like other open-source options, it isn’t particularly easy to use for the non-technically inclined and will need to be carefully managed and configured in order to meet your organization’s needs.
The Open Vulnerability Assessment System (OpenVAS) is a free, open-source platform offering a variety of vulnerability management services. Designed as an all-in-one scanner and maintained by Greenbone Networks, it is designed to perform over 50,000 vulnerability tests and is updated daily.
OpenVAS is designed to run in a Linux-based environment and is aimed at experienced open-source users looking to perform pen-tests or targeted scans. However, like the other open-source tools in this list, it isn’t particularly easy to use for the non-technically savvy, and installing and using this tool poses a significant learning curve. Because it is so difficult to install and learn to use correctly, it can take a lot of time to get up and running smoothly, which can eat up employee time and pull them away from other tasks.
What Information Does Your VirtualArmour Vulnerability Scan Contain?
VirtualArmour offers both one-time vulnerability scanning engagements (vulnerability assessment) and ongoing managed security scanning (vulnerability scanning premium).
One-Time Scan: Vulnerability Assessment
Our one-time vulnerability assessments include both an external scan and a certificate scan and can be useful for auditing purposes or to prove compliance.
Ongoing Vulnerability Scanning: Vulnerability Scanning Premium
Our ongoing vulnerability scanning solution (Vulnerability Scanning Premium) is designed to expose and notify you of potential security gaps in your environment before they can be exploited by cybercriminals. As part of this process, our team of experts will identify:
- Software and firmware vulnerabilities
- Weak security policies and configurations
- Outdated software and operating systems that could be used to penetrate your endpoints and infrastructure
Our team will also scan and audit your publicly exposed resources (such as file servers and web applications) with the goal of minimizing your attack surface as much as possible.
Vulnerability Scanning Premium can also be integrated with our managed SIEM option, offering more comprehensive data and additional context for alerts.
Vulnerability Scanning Premium also includes:
- Custom vulnerability severity levels
- Defined processes and escalation procedures
- A record of all vulnerabilities detected across your environment, both on-premises and in the cloud
- Threat intelligence feeds
- SIEM platform enrichment using vulnerability analytics
This premium option also offers both periodic and on-demand reports, so you always know exactly what is going on, improving your organizational agility by making it easy to respond to issues as they come to light. All asset vulnerabilities are correlated with network configuration and traffic data, allowing us to identify active attack paths across your network. This vital information is used to simulate threat vectors and predict how a theoretical attack could potentially spread across your network. This can help you adjust your incident response plan as necessary and help you take a proactive rather than reactive approach.
In addition to these security benefits, continuous vulnerability scanning can help ensure your organization is complying with relevant legislation, helping you avoid the costly fines associated with noncompliance. Our team of security engineers will continuously analyze the results of your vulnerability scans and use this information to craft concrete, actionable recommendations designed to improve your overall security posture across your organization’s infrastructure, from core to cloud.
For more information about the importance of vulnerability scanning, or to learn more about our vulnerability scanning options, please contact our team today.
Cybersecurity is a complex and continually evolving field. To help keep your knowledge up to date, please visit our articles and resources page and consider reviewing these suggested educational articles and resources.
Cybersecurity Basics For All Organizations
- Hacked? Here’s What to Know (and What to Do Next)
- Guide to Creating an Effective Incident Response Plan
- Terms and Phrases Used in the Managed IT and Cybersecurity Industries
- The SMBs Guide to Getting Started with Cybersecurity
- Cyber Hygiene 101: Basic Steps to Keep Your Company Secure
- Identifying a Breach: Finding Indicators of Compromise (IOC)
- Making Sense of TTPs, Cybersecurity, and What That Means for Your Business
- The Shift From Cybersecurity Being a Want to a Need Just Happened
- What is a Managed Services Security Provider (MSSP)?
- Computer Security Incident Handling Guide: Recommendations of the National Institute of Standards and Technology (NIST)
Cybersecurity Basics By Industry
- Cybersecurity Basics Every College and University Needs to Have in Place
- The Ultimate Guide to Cybersecurity in the Healthcare Industry
- The Rising Cost of Healthcare Industry Data Breaches
- How the Financial Industry Can Strengthen Their Cybersecurity
- Cybersecurity for the Manufacturing Industry, What You Need to Know
Minimizing Your Risks
- What Are the Risks of Using Unsupported Hardware?
- The Risks of Public WiFi (& How to Protect Yourself)
- The Ultimate Guide to Managed Threat Intelligence (2020 Edition)
- Airports are a Hacker’s Best Friend (and Other Ways Users Expose Themselves to Risk)
- Keeping Your Network Secure in a “Bring Your Own Device” World
- Basic Website Precautions: Keep Intruders Out with these Fundamental Security Best Practices
Common Threats (and How to Avoid Them)
- The Modern Hacker: Who They Are, Where They Live, and What They’re After
- In a Remote World, Social Engineering is Even More Dangerous
- Hackers Are Increasingly Targeting People Through Their Phones
- How Fear Motivates People to Click on Spam
- Ransomware is Only Getting Worse: Is Your Organization Prepared to Confront it?
- Everything You Need to Know About Ransomware (2019 Edition)
- 5 Old-School Hack Techniques That Still Work (and How to Protect Your Data)
- DNS Spoofing: What It Is and How to Protect Yourself
- Don’t Let Phishing Scams Catch You Unaware
- Cryptojacking: Because Every Currency Needs to Be Protected
- Why Your Company Could Be the Next Equifax or CapitalOne