Why a penetration test is not enough for your safety

It used to be behind closed doors: Companies did not want to show their humanity. Errors in their websites or software? They could ethically take hackers out, but they were silent about it. Now that is no longer the case and as a business you can be proud that you have ethical hackers working for you to help you improve your product or your online presence.


Bug bounty platform Intigriti conducted research among 1,759 security experts. 96 percent of them would like to spend more time hunting insects and 66 percent are even considering taking it in a full-time job. Not a bad idea as ethical hackers are in high demand right now and so jobs are handy to sort from. Additionally, participating in bug bounty programs is a great way for many well-meaning hackers to keep training themselves in their skills and learning new things.

Especially now that more and more malicious hackers are active due to the pandemic, it is important to hire well-meaning hackers to defend the company against possible cyber attacks. These ethical hackers turn every corner of the software upside down by even trying to hack into the company. If successful, such an ethical hacker will pass on where the problem lies and he or she may be paid for his or her services.

So a win-win situation. An ethical hacker may even start hacking in the evenings in addition to a steady job. This is possible, for example, with the Intigriti platform, where more and more companies and ethical hackers are now able to find each other to achieve an even more secure internet together. With a bug bounty platform like Intigritis, companies have ethical hackers at their disposal all the time as they print bounties to people who report a vulnerability through the platform. An ethical hacker makes money on it, but a company saves a lot of money with it: The total cost saved on cybercrime since the launch of the Intigritis platform is 68 million euros, the company believes. “This is the total cybercrime cost we have saved our customers since the launch of Intigriti.”

Ethical hackers

Often, companies think that an occasional pen test is enough. This is a penetration test where an expert reviews part of the security system to see to what extent it is hackable and contains vulnerabilities. It’s good it’s happening, but it’s often a snapshot, besides it does not cover the entire security line. Intigriti believes that a company should be examined more constantly by security experts, and the experts surveyed agree. 90 percent of the security experts agree that a penetration test does not provide sufficient assurance that an organization is safe day in, day out.

The ethical hackers on the platform themselves determine their working hours and can, for example, hunt down bugs as a side job. Although there are also ethical hackers who have made the Intigriti platform their full-time job. Integrity grows and grows: In one year, the number of security researchers on the platform has increased by 43 percent and the number of reported vulnerabilities by 43 percent. There were also 48 percent more bug bounty programs, and 23 percent of ethical hackers saw it as a good reason to spend more time on the platform and discover bugs. If you join this platform as a company, the group of ethical hackers is large.

find errors

As a company, you are naturally curious about how ethical hackers approach such a career. 54 percent of Intigriti hackers work full-time in another job, and 32 percent are students. One-fifth of part-time fraudsters earn more than a quarter of their total income through bounty prizes. 14 percent of the people at Intigriti are full-time belly hunters, which means 86 percent do it part-time. In short, the ethical hackers find enough weaknesses to make a living from their ‘hunt’. Even if your company has just passed security tests completely, there is a good chance that an Intigriti hacker will still find a vulnerability to exploit. The advantage is that the ethical hacker does not do the last thing: he or she reports the error so that your IT people can ensure that the vulnerability is resolved as soon as possible.

[Fotocredits –
DC Studio © Adobe Stock]

Leave a Comment