Don't Be a Victim

Find your weaknesses before the criminals do - PEN Consultants can help!

Locate

We locate vulnerabilities in your systems.

Mimic

We mimic the actions of a hacker while maintaining confidentiality, integrity, and availability of your data and systems.

Provide

We provide an actionable plan to protect your data.

What Clients Are Saying

Jason Keogh

Jason Keogh

VP of Products

...our customers are directly and immediately benefiting...

Mickey Henry

Mickey Henry

President

...total costs were 50-80% less than the other penetration testing vendor quotes...

Dr. Kevin Harrison

Dr. Kevin Harrison

President

...identified student data vulnerable to hackers...

Blog

Building a Security Testing Business

Building a Security Testing Business I am often asked, “How did you get started with your security testing business?” “What are some lessons learned?” “What are your current challenges?” I have been asked enough times Read more…

HTTP Response Headers

HTTP Response Headers While preparing for a monthly Lunch-and-Learn lesson for a client, I wanted to collect various examples of good, bad, faulty, and missing HTTP response headers. As is typical, I went a little Read more…

MFA Implementation Attacks

MFA Implementation Attacks Most Multi-Factor-Authentication (MFA) implementations do not protect your password from brute forcing or from account level DoS attacks. This article will demonstrate various attacks that exploit weaknesses found in nearly every industry Read more…

Coronavirus

Coronavirus The Coronavirus outbreak should be taken for what it is, an outbreak that deserves our attention and precautionary measures, but not panic.

Forced Password Rotation == Incrementing

Forced Password Rotation == Incrementing Some organizations still force a user to change their password at a defined interval. This is not only ineffective, but it is also detrimental to the security of users’ accounts.


© PEN Consultants, LLC 2013 -