What is vulnerability scanning?
Vulnerability scanning is an automated process that identifies security weaknesses in your IT systems, networks, and applications. It helps detect known vulnerabilities that could be exploited by attackers.
What is the difference between external and internal vulnerability scanning?
External Vulnerability Scanning targets your public-facing assets (e.g., websites, firewalls, email servers) from outside your network to identify vulnerabilities that hackers could exploit. Internal Vulnerability Scanning assesses your internal network from within the firewall to detect risks that could be exploited by malicious insiders or malware that has bypassed perimeter defences.
Why do I need both types of scans?
Using both provides a comprehensive view of your security posture: External scans protect against outside threats, while Internal scans help detect lateral movement paths, misconfigurations, and insider threats. Together, they ensure layered security and compliance with industry standards.
How often should vulnerability scans be performed?
We recommend that External Scans should be performed monthly. Public-facing devices are generally most exposed to cyber attacks, but generally don't have a very high turnover rate; you're unlikely to replace your office firewall more than once every few years, and most manufacturers tend to provide firmware/software updates on a monthly cycle (or less often).By contrast, internal networks are far more dynamic, often with new devices being added and/or updated by the week or even day. Therefore, we recommend weekly Internal scans, to give the best chance of catching new vulnerabilities before they can be exploited.
Will the scans disrupt my systems?
No. Our scanning tools are designed to be non-intrusive and safe for production environments. We also offer customisable scan windows to minimize any potential impact.
Is vulnerability scanning the same as penetration testing?
No. Vulnerability scanning works on a "dictionary" of known vulnerabilities which is constantly being updated, not dissimilar to a traditional Antivirus solution. Penetration testing often starts with a kind of Vulnerability Scan, but then progresses into a much more in-depth process that simulates real-world attacks, often chaining together "small" weaknesses to form a far more significant attack. Both are important, but serve different purposes.
What happens after the scan?
You’ll receive a detailed report that includes: A list of identified vulnerabilities, risk ratings and potential impact, remediation recommendations, and optional consultation to help prioritise and address findings.
Do you help with remediation?
Yes. We offer expert guidance and support to help your team fix vulnerabilities, or we can provide hands-on remediation services if needed.


