Internal network security is often overlooked by organizations because many believe only external attacks are a threat.However, a well-planned spear phishing attackto end-users will ultimately bypass all external protective measures and instantly expose internal resources. With sensitive business information one mistake away from being exploited by an attacker, internal network security testing and hardening is critical.

Another form of attack is the insider threat. An internal security attacker may be pursuing specific dataor have inside knowledge. Experience and history have shown that one insider threat can prove effective at completely dismantling an organization. Limiting exposure to a potential internal breach is another benefit of internal network testing. The following are some examples of how an internal attack may be initiated:

  • Internally: Local user privileges are readily available
    • Disgruntled employee or contractor
    • Facility break-in or unlocked terminal
  • Externally: The first line of defense is compromised
    • Hacker infiltrates system
    • Human error or software defect enables a valid communication channel
    • Malware infestation

An Internal Penetration Test imitates an actual attacker exploiting vulnerabilities in network security from an internal position – possibility with local access or company security knowledge. This test examines internal information security systems for any weakness that may be used to disrupt the confidentiality, availability, or integrity of the network.


All organizations will benefit from an Internal Penetration Test – In fact, many industries understand the benefits and require Internal Penetration Testing. At the conclusion of the Internal Penetration Test you will understand the internal vulnerabilities of your network. As a result, your organization will be able to implement the Silent Break Security solutions to address internal security weaknesses.

Additional benefits of the Internal Penetration Tests include the following:

  • Identifies existing effective internal network security
  • Identify improvement areas to achieve adequate security
  • Establish immediate strategic resolutions
  • Develop long-term strategic solutions to prevent weaknesses from recurring
  • Develop strategic solutions to prevent industry known issues from emerging
  • Tests an organization’s internal monitoring
  • Tests an organization’s incident response capabilities
  • Meets industry compliance
  • Results in protection from internal threats and ensures internal user privileges cannot be misused
  • Identifies poor access controls
  • Provides organizational security awareness