{"id":2241,"date":"2019-11-12T17:51:40","date_gmt":"2019-11-12T09:51:40","guid":{"rendered":"https:\/\/www.pacificprime.hk\/blog\/?p=2241"},"modified":"2019-11-12T17:51:40","modified_gmt":"2019-11-12T09:51:40","slug":"penetration-test-vs-vulnerability-scan","status":"publish","type":"post","link":"https:\/\/www.pacificprime.hk\/blog\/penetration-test-vs-vulnerability-scan\/","title":{"rendered":"The difference between a penetration test and a vulnerability scan"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Virtually every company right now uses computers, or cloud services to run its operations as well as store (often very sensitive) data. While collecting and storing data is imperative to run a business nowadays, at the same time these companies are facing a tremendous risk of cybersecurity breaches. There are, of course, a few ways companies can minimize those risks, be it through securing cyber insurance, investing in the latest security systems, but also by performing cybersecurity risk assessments that, among other tests, might include penetration tests, and vulnerability scan.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This article by <\/span><a href=\"http:\/\/www.pacificprime.hk\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Pacific Prime Hong Kong<\/span><\/a><span style=\"font-weight: 400;\"> will explain the importance of conducting cybersecurity risk assessments, and the difference between a penetration test and a vulnerability scan.<\/span><\/p>\n<style type=\"text\/css\"><!--td {border: 1px solid #ccc;}br {mso-data-placement:same-cell;}--><\/style>\n<p><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:573,&quot;3&quot;:{&quot;1&quot;:0},&quot;5&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;6&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;7&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;8&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;12&quot;:0}\"><div class='code-block code-block-4' style='margin: 8px 0; clear: both;'>\n<p><a href=\"https:\/\/www.pacificprime.hk\/insurance-plans\/business-insurance\/?campSource=PPHK-Blog&utm_source=blog&utm_medium=content_banner&utm_campaign=Blog_Banner&utm_content=company\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-1280\" src=\"https:\/\/i0.wp.com\/www.pacificprime.hk\/blog\/wp-content\/uploads\/2022\/12\/WP-Banner-revamp-final-20221207_4.-Business-final.jpg?resize=700%2C303&#038;ssl=1\" alt=\"Company insurance banner\" width=\"700\" height=\"303\" data-recalc-dims=\"1\" \/><\/a><\/p><\/div>\n<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Cybersecurity strategy is a must\u00a0<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">All companies that have a website, store customer or client data on their servers, or even have a social media presence are in need of having a cybersecurity strategy in place. Potential cybersecurity threats such as hacker attacks, monetary losses due to a server down-time, or leakage of sensitive client\u2019s data are just a few to name, and can seriously damage the company\u2019s reputation and ability to continue the business. One way to minimize these risks is to run cybersecurity tests, such as the penetration test and vulnerability scan.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">What is the main difference between vulnerability scanning and penetration testing?\u00a0<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Both types of these risk assessment tests aim to find weak points in the network systems they are scanning. However, vulnerability scans and vulnerability assessments search systems for known vulnerabilities, while penetration tests attempt to actively exploit weaknesses, for example, through a controlled virus attack. This will tell the company if their defense systems are strong enough, and in which areas they need to improve. Most companies run penetration tests to assess and find out real security weaknesses in their systems, while vulnerability scans are good for security maintenance, as it\u2019s based upon an already known database and known threats.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To summarize, vulnerability scanning is based on a set of known threats, aiming to \u201cdouble-check\u201d if the current networks are strong enough to defend itself. A penetration test is a more comprehensive test, as it checks the system for new and unknown threats, exposing more potential weaknesses in the system. Both types of tests are best to run through a third-party company to ensure the objectiveness of the results. Both vulnerability scans and penetration tests are important to a cybersecurity risk analysis, and when done properly, they help businesses prepare better and minimize cyber risks threats significantly.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Consider cyber insurance for an extra layer of protection<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Similar to <\/span><a href=\"https:\/\/www.pacificprime.com\/corporate\/company-insurance-solutions\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">errors and omissions (E&amp;O) insurance<\/span><\/a><span style=\"font-weight: 400;\">, cyber insurance normally covers expenses related to the first-party damage, as well as claims by third parties. Third-party coves costs related to investigation expenses, lawsuits, and extortion, as well as liability arising from a failure to maintain the confidentiality of data. First-party coverage covers direct losses to the company, such as business interruption, data recovery, monetary losses due to network downtime, and costs involved in managing a crisis \u2013 which may involve repairing a company\u2019s reputation.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Protect your business from cyber-threats<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Cyber risks are changing and evolving quickly. Frequently carried out penetration tests and vulnerability scans together a cyber insurance plan in place should be able to protect your company from unpredictable cybersecurity threats. To learn more about cyber insurance, <\/span><a href=\"https:\/\/www.pacificprime.hk\/contact-us\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">contact Pacific Prime Hong Kong<\/span><\/a><span style=\"font-weight: 400;\"> today for impartial advice on receiving a cyber-security risk assessment.<\/span><\/p>\n<style type=\"text\/css\"><!--td {border: 1px solid #ccc;}br {mso-data-placement:same-cell;}--><\/style>\n<p><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:573,&quot;3&quot;:{&quot;1&quot;:0},&quot;5&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;6&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;7&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;8&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;12&quot;:0}\"><div class='code-block code-block-7' style='margin: 8px 0; clear: both;'>\n<p><a href=\"https:\/\/www.pacificprime.com\/corporate\/?campSource=PPHK-Blog&utm_source=blog&utm_medium=cta_banner&utm_campaign=Blog_Banner&utm_content=corporate\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-1278\" src=\"https:\/\/i0.wp.com\/www.pacificprime.hk\/blog\/wp-content\/uploads\/2019\/06\/HK-BANNER-Business.jpg?resize=700%2C303&#038;ssl=1\" alt=\"Corporate insurance banner\" width=\"700\" height=\"303\" data-recalc-dims=\"1\" \/><\/a><\/p><\/div>\n<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Virtually every company right now uses computers, or cloud services to run its operations as well as store (often very sensitive) data. While collecting and storing data is imperative to run a business nowadays, at the same time these companies are facing a tremendous risk of cybersecurity breaches. There are, of course, a few ways &#8230;<\/p>\n","protected":false},"author":14,"featured_media":2242,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"This article by Pacific Prime Hong Kong will explain the importance of conducting cyber security risk assessments, it\u2019s influence on the insurance, and the difference between a penetration test and a vulnerability scan.","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2},"_links_to":"","_links_to_target":""},"categories":[2],"tags":[789,34,465,788,1239,1240,1243,1242,171,1238,1237,1241],"class_list":["post-2241","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insurance","tag-ban_cor","tag-corporate-insurance","tag-corporate-insurance-hong-kong","tag-cta_cor","tag-cyberinsurance","tag-cybersecurity","tag-errors-and-omissions-eo-insurance","tag-general-insurance","tag-pacific-prime-hong-kong","tag-penetration-test","tag-penetration-test-and-a-vulnerability-scan","tag-risk-assessment"],"jetpack_publicize_connections":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Difference Between a Penetration Test And a Vulnerability Scan<\/title>\n<meta name=\"description\" content=\"Cybersecurity risk assessments in form of a penetration test or a vulnerability scan are impreative to know the threats that might engander your company.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pacificprime.hk\/blog\/penetration-test-vs-vulnerability-scan\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Difference Between a Penetration Test And a Vulnerability Scan\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity risk assessments in form of a penetration test or a vulnerability scan are impreative to know the threats that might engander your company.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pacificprime.hk\/blog\/penetration-test-vs-vulnerability-scan\/\" \/>\n<meta property=\"og:site_name\" content=\"Pacific Prime Hong Kong&#039;s Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-12T09:51:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i2.wp.com\/www.pacificprime.hk\/blog\/wp-content\/uploads\/2019\/11\/internet-screen-security-protection-60504.jpg?fit=1138%2C493&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1138\" \/>\n\t<meta property=\"og:image:height\" content=\"493\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"elwira\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"elwira\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Difference Between a Penetration Test And a Vulnerability Scan","description":"Cybersecurity risk assessments in form of a penetration test or a vulnerability scan are impreative to know the threats that might engander your company.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pacificprime.hk\/blog\/penetration-test-vs-vulnerability-scan\/","og_locale":"en_US","og_type":"article","og_title":"The Difference Between a Penetration Test And a Vulnerability Scan","og_description":"Cybersecurity risk assessments in form of a penetration test or a vulnerability scan are impreative to know the threats that might engander your company.","og_url":"https:\/\/www.pacificprime.hk\/blog\/penetration-test-vs-vulnerability-scan\/","og_site_name":"Pacific Prime Hong Kong&#039;s Blog","article_published_time":"2019-11-12T09:51:40+00:00","og_image":[{"width":1138,"height":493,"url":"https:\/\/i2.wp.com\/www.pacificprime.hk\/blog\/wp-content\/uploads\/2019\/11\/internet-screen-security-protection-60504.jpg?fit=1138%2C493&ssl=1","type":"image\/jpeg"}],"author":"elwira","twitter_card":"summary_large_image","twitter_misc":{"Written by":"elwira","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.pacificprime.hk\/blog\/penetration-test-vs-vulnerability-scan\/","url":"https:\/\/www.pacificprime.hk\/blog\/penetration-test-vs-vulnerability-scan\/","name":"The Difference Between a Penetration Test And a Vulnerability Scan","isPartOf":{"@id":"https:\/\/www.pacificprime.hk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pacificprime.hk\/blog\/penetration-test-vs-vulnerability-scan\/#primaryimage"},"image":{"@id":"https:\/\/www.pacificprime.hk\/blog\/penetration-test-vs-vulnerability-scan\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.pacificprime.hk\/blog\/wp-content\/uploads\/2019\/11\/internet-screen-security-protection-60504.jpg?fit=1138%2C493&ssl=1","datePublished":"2019-11-12T09:51:40+00:00","dateModified":"2019-11-12T09:51:40+00:00","author":{"@id":"https:\/\/www.pacificprime.hk\/blog\/#\/schema\/person\/75282357499fb735904e6c7504ec115e"},"description":"Cybersecurity risk assessments in form of a penetration test or a vulnerability scan are impreative to know the threats that might engander your company.","breadcrumb":{"@id":"https:\/\/www.pacificprime.hk\/blog\/penetration-test-vs-vulnerability-scan\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pacificprime.hk\/blog\/penetration-test-vs-vulnerability-scan\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pacificprime.hk\/blog\/penetration-test-vs-vulnerability-scan\/#primaryimage","url":"https:\/\/i0.wp.com\/www.pacificprime.hk\/blog\/wp-content\/uploads\/2019\/11\/internet-screen-security-protection-60504.jpg?fit=1138%2C493&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.pacificprime.hk\/blog\/wp-content\/uploads\/2019\/11\/internet-screen-security-protection-60504.jpg?fit=1138%2C493&ssl=1","width":1138,"height":493,"caption":"Penetration Test And a Vulnerability Scan"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pacificprime.hk\/blog\/penetration-test-vs-vulnerability-scan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pacificprime.hk\/blog\/"},{"@type":"ListItem","position":2,"name":"The difference between a penetration test and a vulnerability scan"}]},{"@type":"WebSite","@id":"https:\/\/www.pacificprime.hk\/blog\/#website","url":"https:\/\/www.pacificprime.hk\/blog\/","name":"Pacific Prime Hong Kong&#039;s Blog","description":"Top articles covering International Health Insurance in Hong Kong and beyond","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pacificprime.hk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.pacificprime.hk\/blog\/#\/schema\/person\/75282357499fb735904e6c7504ec115e","name":"elwira","description":"Elwira Skrybus is a content writer at Pacific Prime. In her everyday work, she is utilizing her previous social media and branding experience to create informative articles, guides, and reports to help our readers simplify the sometimes-puzzling world of international health insurance. When she isn\u2019t writing, you are most likely to find Elwira in search of the perfect plant-based burger or enjoying Hong Kong\u2019s great outdoors either at the beach or from the boat - the closer to the sea, the better!","url":"https:\/\/www.pacificprime.hk\/blog\/author\/elwira\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.pacificprime.hk\/blog\/wp-content\/uploads\/2019\/11\/internet-screen-security-protection-60504.jpg?fit=1138%2C493&ssl=1","jetpack_sharing_enabled":true,"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.pacificprime.hk\/blog\/wp-json\/wp\/v2\/posts\/2241"}],"collection":[{"href":"https:\/\/www.pacificprime.hk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pacificprime.hk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pacificprime.hk\/blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pacificprime.hk\/blog\/wp-json\/wp\/v2\/comments?post=2241"}],"version-history":[{"count":4,"href":"https:\/\/www.pacificprime.hk\/blog\/wp-json\/wp\/v2\/posts\/2241\/revisions"}],"predecessor-version":[{"id":2246,"href":"https:\/\/www.pacificprime.hk\/blog\/wp-json\/wp\/v2\/posts\/2241\/revisions\/2246"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pacificprime.hk\/blog\/wp-json\/wp\/v2\/media\/2242"}],"wp:attachment":[{"href":"https:\/\/www.pacificprime.hk\/blog\/wp-json\/wp\/v2\/media?parent=2241"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pacificprime.hk\/blog\/wp-json\/wp\/v2\/categories?post=2241"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pacificprime.hk\/blog\/wp-json\/wp\/v2\/tags?post=2241"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}