Skip to the content
  • Why Vertex
    • Expertise in Education
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
  • Why Vertex
    • Expertise in Education
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
LOG IN

How Much Should You Share With A Penetration Testing Company?

Penetration Testing is the process where we think like a cyber attacker using their tools and methods to identify vulnerabilities in your systems, network, servers, websites, webapps, office and so forth. This allows the company we are penetration testing to resolve the vulnerabilities so those vulnerabilities are no longer vulnerable for the hackers. So, how much should you share with a Penetration Testing company?

Some people think to make it fair a Penetration Testing company should have as little information as possible so that it is the same information that a cyber attacker would have. This is great if you want to compare a Penetration Testing company against a Cyber attacker, but ultimately you want the Penetration Tester to find as many vulnerabilities as possible. So any advantage or extra information you can provide to the Penetration Tester increases the chances of them finding more vulnerabilities which allows you to resolve them and be more protected. We don’t want to be fair with the Cyber Attacker. We want them to be at a significant disadvantage while maximising your cyber security.


The other concern we hear is that the Penetration Tester may identify vulnerabilities that provide elevated access to systems. the penetration tester may potentially use that access for malicious purposes. For this reason, where possible, we recommend providing access to a non-production environment. A non production environment is the same, or very similar, in setup and code to the production environment but it doesn’t contain sensitive information. In the cases where this is not possible we can, and have, performed Penetration Testing on production environments.

Either way a vulnerability found would apply to all environments so a malicious penetration tester could use that information to potentially impact or gain access to production data anyway. This is why all employees of Vertex have to go through multiple background, personality, personal values and security checks before being hired.

That said, at the end of the day you still need to trust someone to help test your cyber security, so picking the right company is important. This is why you should make sure you only use a CREST approved company that have proven their trust with years of services.


Vertex Cyber Security is CREST approved and for more than 8years has provided Penetration Testing to many companies from Top100 ASX to SMBs to startups. Contact Vertex for your next Penetration Test.

CATEGORIES

Penetration Testing

TAGS

information for penetration test - information to share for penetration test - penetration test - penetration testing

SHARE

PrevPreviousEverything You’ve Ever Wanted to Know About Penetration Testing Methodology
NextReconnaissance In Penetration Testing – Everything You Need To KnowNext

Follow Us!

Facebook Twitter Linkedin Instagram
Cyber Security by Vertex, Sydney Australia

Your partner in Cyber Security.

Terms of Use | Privacy Policy

Accreditations & Certifications

blank
blank
blank
blank
blank
  • 1300 229 237
  • Suite 13.04 189 Kent Street Sydney NSW 2000 Australia
  • 121 King St, Melbourne VIC 3000
  • Lot Fourteen, North Terrace, Adelaide SA 5000
  • Level 2/315 Brunswick St, Fortitude Valley QLD 4006, Adelaide SA 5000

(c) 2025 Vertex Technologies Pty Ltd.

download (2)
download (4)

We acknowledge Aboriginal and Torres Strait Islander peoples as the traditional custodians of this land and pay our respects to their Ancestors and Elders, past, present and future. We acknowledge and respect the continuing culture of the Gadigal people of the Eora nation and their unique cultural and spiritual relationships to the land, waters and seas.

We acknowledge that sovereignty of this land was never ceded. Always was, always will be Aboriginal land.