US English (US)
FR French

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Create a Ticket

  • Return to HighGround
English (US)
US English (US)
FR French
  • Home
  • Pro Services
  • Helpful Resources

Why do I have to sign a Vulnerability Assessment Authorisation Form?

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Create a Ticket

  • Dashboard
    CEO CTO CFO
  • Technical Drilldown
    Helpful Resources
  • Compliance Manager
    Compliance Status' Helpful Resources
  • Cyber Trend Data
  • Pro Services
    Rewards Buy or Enquire Helpful Resources
  • Cyber KPI's
    Role-Based KPI's Primary KPI's Getting Started
  • Sign Up & Sign In
    Helpful Resources
  • Integrations
    Referrals Guides for Each Tool Helpful Resources
  • Settings
    Notifications Personal Profile System Settings User Management Subscriptions
+ More

Dashboard

Technical Drilldown

Compliance Manager

Cyber Trend Data

Pro Services

Rewards

Buy or Enquire

Helpful Resources

  Guide to Professional Services from HighGround

  What is Cyber Essentials and why should I get certified?

  What is the Dark Web and why should I monitor it?

  Why should I audit my Office 365 Security?

  Why should I Perform a Cyber Risk Assessment?

  Why you should Plan to Fail

  Why do I have to sign a Vulnerability Assessment Authorisation Form?

  What is the difference between a Vulnerability Assessment and a Penetration Test?

  What is the difference between a Cyber Risk Assessment and a Vulnerability Assessment?

  What is the NIST Cyber Security Framework?

  How to Respond to a Cyber Attack

Cyber KPI's

Sign Up & Sign In

Integrations

Settings

Delete

INFO 

Vulnerability Assessments can provide you with a comprehensive overview of the Vulnerabilities within your IT systems, and the areas that are most likely to be compromised in an attack. You can purchase a Vulnerability Assessment via our Pro services.

Before performing a Vulnerability Assessment for your organisation, you will be asked to sign a Vulnerability Assessment Authorisation Form.

The main purpose of a Vulnerability Assessment Authorisation Form is to authorise our security engineers and business analysts to legally perform this work.

During the course of the Assessment we are likely to uncover security flaws residing in your IT infrastructure. The process of finding these and confirming that they are susceptible to attack can lead to technical or performance issues in your IT systems. In addition to this, the scope of the assessment is also defined and agreed, thus ensuring we are assessing only what you have agreed to. Hence, due to the sensitive nature of the information we will be discovering, and the possible consequences - it is important that you read and sign the Vulnerability Assessment Authorisation Form so that you are aware of the implications beforehand and are happy to go ahead with the assessment. 

The form should also make you aware of the scope of the assessment, so that you know of which devices are to be inspected, and the date range within which we will be authorised to inspect them. 



va

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • How do I use my Pro Services credit?

    Use your Pro Services Credit to save money on purchases

  • How to Send a Cyber Security Report to your CEO/CFO/CTO

    Send a Cyber Report to your C-Suite to earn Pro Services Credit

  • What is the difference between a Cyber Risk Assessment and a Vulnerability Assessment?

  • How to Share on Social Media

    Share your progress in HighGround on Social Media to earn Pro-Services Credit

Create Ticket

Reach out to our support team

Open a Ticket

Copyright 2023 – m3 Networks Limited.

Knowledge Base Software by Helpjuice

0
0
Expand