{"id":25719,"date":"2021-10-14T14:45:10","date_gmt":"2021-10-14T11:45:10","guid":{"rendered":"https:\/\/cypro.bg\/?page_id=25719"},"modified":"2023-11-07T14:50:28","modified_gmt":"2023-11-07T11:50:28","slug":"penetration-testing","status":"publish","type":"page","link":"https:\/\/cypro.bg\/en\/penetration-testing\/","title":{"rendered":"Penetration testing"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; prev_background_color=&#8221;#ffffff&#8221; next_background_color=&#8221;#ffffff&#8221; admin_label=&#8221;Header&#8221; module_id=&#8221;penetration-testing__block-1&#8243; _builder_version=&#8221;4.16&#8243; background_color=&#8221;#f1fafe&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_type=&#8221;circular&#8221; background_color_gradient_direction_radial=&#8221;top&#8221; background_color_gradient_stops=&#8221;#00ffd8 0%|#0029e2 100%&#8221; background_color_gradient_start=&#8221;#00ffd8&#8243; background_color_gradient_end=&#8221;#0029e2&#8243; background_enable_image=&#8221;off&#8221; width=&#8221;100%&#8221; custom_padding=&#8221;||0px|||&#8221; top_divider_style=&#8221;asymmetric2&#8243; bottom_divider_style=&#8221;asymmetric2&#8243; background_last_edited=&#8221;on|phone&#8221; background_position_tablet=&#8221;center_right&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;||77px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-10.png&#8221; alt=&#8221;penetration&#8221; title_text=&#8221;cyber-security-10&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; header_font=&#8221;|900|||||||&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;69px&#8221; width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; header_font_size_tablet=&#8221;54px&#8221; header_font_size_phone=&#8221;32px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1 style=\"text-align: left;\">Penetration testing<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;Overpass|300|||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;20px&#8221; text_line_height=&#8221;1.8em&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>A penetration test is a cybersecurity assessment and testing technique conducted on computer systems, networks, applications, or physical security measures to identify vulnerabilities and weaknesses that could be exploited by malicious hackers. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; prev_background_color=&#8221;#f1fafe&#8221; admin_label=&#8221;Features&#8221; _builder_version=&#8221;4.16&#8243; custom_margin=&#8221;||&#8221; custom_padding=&#8221;||||false|&#8221; top_divider_style=&#8221;slant&#8221; top_divider_height=&#8221;20vw&#8221; bottom_divider_height=&#8221;20vw&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_margin=&#8221;-18px|auto|-4vw|auto||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Identification of Vulnerabilities&#8221; image=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-illustrated-icons-07.png&#8221; _builder_version=&#8221;4.16&#8243; header_font=&#8221;Overpass|900|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;||||||||&#8221; body_text_color=&#8221;#000000&#8243; body_font_size=&#8221;15px&#8221; text_orientation=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>Penetration tests assess an organization&#8217;s ability to protect its networks, applications and users from external or internal attempts to breach its security controls<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Proactive Security&#8221; image=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-illustrated-icons-05.png&#8221; _builder_version=&#8221;4.16&#8243; header_font=&#8221;Overpass|900|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;||||||||&#8221; body_text_color=&#8221;#000000&#8243; body_font_size=&#8221;15px&#8221; text_orientation=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>Penetration testing takes a proactive approach, uncovering weaknesses so organizations know what is needed and whether additional layers of protection should be implemented<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; transform_scale_tablet=&#8221;&#8221; transform_scale_phone=&#8221;&#8221; transform_scale_last_edited=&#8221;on|desktop&#8221; transform_translate=&#8221;0px|94px&#8221; transform_translate_tablet=&#8221;0px|0px&#8221; transform_translate_phone=&#8221;&#8221; transform_translate_last_edited=&#8221;on|tablet&#8221; transform_translate_linked=&#8221;off&#8221; transform_rotate_tablet=&#8221;&#8221; transform_rotate_phone=&#8221;&#8221; transform_rotate_last_edited=&#8221;on|desktop&#8221; transform_skew_tablet=&#8221;&#8221; transform_skew_phone=&#8221;&#8221; transform_skew_last_edited=&#8221;on|desktop&#8221; transform_origin_tablet=&#8221;&#8221; transform_origin_phone=&#8221;&#8221; transform_origin_last_edited=&#8221;on|desktop&#8221; transform_styles_last_edited=&#8221;on|tablet&#8221; transform_styles_tablet=&#8221;&#8221; transform_styles_phone=&#8221;&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Regulatory Compliance&#8221; image=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-illustrated-icons-03.png&#8221; _builder_version=&#8221;4.16&#8243; header_font=&#8221;Overpass|900|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;||||||||&#8221; body_text_color=&#8221;#000000&#8243; body_font_size=&#8221;15px&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>Penetration testing helps organizations address common aspects of auditing and regulatory compliance and industry best practices<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Operational Efficiency&#8221; image=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-illustrated-icons-06.png&#8221; _builder_version=&#8221;4.16&#8243; header_font=&#8221;Overpass|900|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Overpass||||||||&#8221; body_text_color=&#8221;#000000&#8243; body_font_size=&#8221;15px&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>By regularly reviewing your security infrastructure, you&#8217;ll know how to prepare to ensure your organization never comes under attack<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; prev_background_color=&#8221;#ffffff&#8221; next_background_color=&#8221;#ffffff&#8221; admin_label=&#8221;About&#8221; module_id=&#8221;section__penetration__block3&#8243; module_class=&#8221;section__penetration__block3&#8243; _builder_version=&#8221;4.16&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_type=&#8221;circular&#8221; background_color_gradient_stops=&#8221;#004183 0%|#001f4c 100%&#8221; background_color_gradient_start=&#8221;#004183&#8243; background_color_gradient_end=&#8221;#001f4c&#8221; background_image=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/cyber-security-17.png&#8221; custom_margin=&#8221;||0vw|||&#8221; custom_padding=&#8221;||3vw|||&#8221; top_divider_style=&#8221;slant&#8221; top_divider_height=&#8221;20vw&#8221; bottom_divider_style=&#8221;wave2&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; module_class=&#8221;section__penetration__block3-col-left&#8221; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;9vw||&#8221; custom_padding_tablet=&#8221;0vw||&#8221; custom_padding_last_edited=&#8221;off|desktop&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; header_2_font=&#8221;Overpass|900|||||||&#8221; header_2_font_size=&#8221;56px&#8221; header_2_line_height=&#8221;1.1em&#8221; header_3_font=&#8221;Overpass|600|||||||&#8221; header_3_text_color=&#8221;#00b4ff&#8221; header_3_font_size=&#8221;30px&#8221; header_3_line_height=&#8221;1.2em&#8221; background_layout=&#8221;dark&#8221; header_2_font_size_tablet=&#8221;38px&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; header_3_font_tablet=&#8221;&#8221; header_3_font_phone=&#8221;Overpass|700|||||||&#8221; header_3_font_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;24px&#8221; header_3_font_size_phone=&#8221;18px&#8221; header_3_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><span style=\"color: #ffffff;\">Increase security, reduce risk, facilitate regulatory compliance and improve operational efficiency.<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#00b4ff&#8221; divider_weight=&#8221;2px&#8221; _builder_version=&#8221;4.16&#8243; width=&#8221;100px&#8221; custom_margin=&#8221;||0px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;Overpass|300|||||||&#8221; text_font_size=&#8221;17px&#8221; text_line_height=&#8221;1.8em&#8221; background_layout=&#8221;dark&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\"><span jsaction=\"agoMJf:PFBcW;MZfLnc:P7O7bd;nt4Alf:pvnm0e,pfE8Hb,PFBcW;B01qod:dJXsye;H1e5u:iXtTIf;lYIUJf:hij5Wb;bmeZHc:iURhpf;Oxj3Xe:qAKMYb,yaf12d\" jsname=\"txFAF\" class=\"jCAhz ChMk0b\" jscontroller=\"Gn4SMb\"><span class=\"ryNqvb\" jsaction=\"click:E6Tfl,GFf3ac,tMZCfe; contextmenu:Nqw7Te,QP7LD; mouseout:Nqw7Te; mouseover:E6Tfl,c2aHje\" jsname=\"W297wb\">We use our penetration testing and threat intelligence tactics to show how an attacker would gain unauthorized access to your environment.<\/span><\/span><span> <\/span><span jsaction=\"agoMJf:PFBcW;MZfLnc:P7O7bd;nt4Alf:pvnm0e,pfE8Hb,PFBcW;B01qod:dJXsye;H1e5u:iXtTIf;lYIUJf:hij5Wb;bmeZHc:iURhpf;Oxj3Xe:qAKMYb,yaf12d\" jsname=\"txFAF\" class=\"jCAhz ChMk0b\" jscontroller=\"Gn4SMb\"><span class=\"ryNqvb\" jsaction=\"click:E6Tfl,GFf3ac,tMZCfe; contextmenu:Nqw7Te,QP7LD; mouseout:Nqw7Te; mouseover:E6Tfl,c2aHje\" jsname=\"W297wb\">Our &#8220;good hackers&#8221; enable your organization to increase security measures.<\/span><\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjI1NDE5In19@&#8221; button_text=&#8221;Book a consultation&#8221; _builder_version=&#8221;4.16&#8243; _dynamic_attributes=&#8221;button_url&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#00b4ff&#8221; button_bg_color=&#8221;rgba(0,0,0,0)&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;#00b4ff&#8221; button_border_radius=&#8221;100px&#8221; button_font=&#8221;Overpass|900||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_padding=&#8221;12px|24px|12px|24px|true|true&#8221; box_shadow_style=&#8221;preset3&#8243; box_shadow_vertical=&#8221;0px&#8221; box_shadow_blur=&#8221;0px&#8221; box_shadow_spread=&#8221;-10px&#8221; box_shadow_color=&#8221;rgba(25,114,255,0.4)&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_color__hover=&#8221;#2585b2&#8243; box_shadow_blur__hover_enabled=&#8221;on&#8221; box_shadow_blur__hover=&#8221;40px&#8221; box_shadow_vertical__hover_enabled=&#8221;on&#8221; box_shadow_vertical__hover=&#8221;10px&#8221;][\/et_pb_button][et_pb_image src=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/cyber-security-06-1.png&#8221; title_text=&#8221;cyber-security-06-1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; module_class=&#8221;section__penetration__block3-col-right&#8221; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;29vw||&#8221; custom_padding_tablet=&#8221;0vw||&#8221; custom_padding_phone=&#8221;&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1><span style=\"color: #ffffff;\">Types ot Penetration tests<\/span><\/h1>\n<p>[\/et_pb_text][et_pb_blurb title=&#8221;External servers and network endpoints&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x5a;||divi||400&#8243; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.23&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;RGBA(0,0,0,0)&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_blurb][et_pb_blurb title=&#8221;Internal network infrastructure and services&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x5a;||divi||400&#8243; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.23&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;RGBA(0,0,0,0)&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_blurb][et_pb_blurb title=&#8221;Web Applications&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x5a;||divi||400&#8243; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.23&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;RGBA(0,0,0,0)&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_blurb][et_pb_blurb title=&#8221;Vulnerability Assessment&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x5a;||divi||400&#8243; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.23&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#FFFFFF&#8221; background_color=&#8221;RGBA(0,0,0,0)&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;2px||19px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; header_font_size=&#8221;34px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1><strong><span style=\"color: #003366;\"><span>How often should you do Penetration testing?<\/span><\/span><\/strong><\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;15px&#8221; text_orientation=&#8221;justified&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span jsaction=\"agoMJf:PFBcW;MZfLnc:P7O7bd;nt4Alf:pvnm0e,pfE8Hb,PFBcW;B01qod:dJXsye;H1e5u:iXtTIf;lYIUJf:hij5Wb;bmeZHc:iURhpf;Oxj3Xe:qAKMYb,yaf12d\" jsname=\"txFAF\" class=\"jCAhz ChMk0b\" jscontroller=\"Gn4SMb\"><span class=\"ryNqvb\" jsaction=\"click:E6Tfl,GFf3ac,tMZCfe; contextmenu:Nqw7Te,QP7LD; mouseout:Nqw7Te; mouseover:E6Tfl,c2aHje\" jsname=\"W297wb\">Penetration tests should be performed every 6 or 12 months to ensure more consistent IT network security management.<\/span><\/span><span> <\/span><span jsaction=\"agoMJf:PFBcW;MZfLnc:P7O7bd;nt4Alf:pvnm0e,pfE8Hb,PFBcW;B01qod:dJXsye;H1e5u:iXtTIf;lYIUJf:hij5Wb;bmeZHc:iURhpf;Oxj3Xe:qAKMYb,yaf12d\" jsname=\"txFAF\" class=\"jCAhz ChMk0b\" jscontroller=\"Gn4SMb\"><span class=\"ryNqvb\" jsaction=\"click:E6Tfl,GFf3ac,tMZCfe; contextmenu:Nqw7Te,QP7LD; mouseout:Nqw7Te; mouseover:E6Tfl,c2aHje\" jsname=\"W297wb\">A penetration test will reveal how newly discovered threats or emerging vulnerabilities can potentially be exploited by hackers.<\/span><\/span><span> <\/span><span jsaction=\"agoMJf:PFBcW;MZfLnc:P7O7bd;nt4Alf:pvnm0e,pfE8Hb,PFBcW;B01qod:dJXsye;H1e5u:iXtTIf;lYIUJf:hij5Wb;bmeZHc:iURhpf;Oxj3Xe:qAKMYb,yaf12d\" jsname=\"txFAF\" class=\"jCAhz ChMk0b\" jscontroller=\"Gn4SMb\"><span class=\"ryNqvb\" jsaction=\"click:E6Tfl,GFf3ac,tMZCfe; contextmenu:Nqw7Te,QP7LD; mouseout:Nqw7Te; mouseover:E6Tfl,c2aHje\" jsname=\"W297wb\">In addition to regularly scheduled analyzes and assessments required by regulatory authorities, tests should also be conducted:<\/span><\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|700|||||||&#8221; text_text_color=&#8221;#002851&#8243; text_font_size=&#8221;18px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\">Whenever:<\/p>\n<p>[\/et_pb_text][et_pb_blurb title=&#8221;Adding new infrastructure&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x52;||divi||400&#8243; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h6&#8243; header_font=&#8221;Mukta||||||||&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;1.6em&#8221; body_line_height=&#8221;2em&#8221; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||22px|||&#8221; animation_style=&#8221;fold&#8221; animation_direction=&#8221;bottom&#8221; animation_intensity_fold=&#8221;5%&#8221; animation=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Making changes to security systems&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x52;||divi||400&#8243; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h6&#8243; header_font=&#8221;Mukta||||||||&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;1.6em&#8221; body_line_height=&#8221;2em&#8221; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||20px|||&#8221; animation_style=&#8221;fold&#8221; animation_direction=&#8221;bottom&#8221; animation_intensity_fold=&#8221;5%&#8221; animation=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Performing infrastructure or application upgrades&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x52;||divi||400&#8243; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h6&#8243; header_font=&#8221;Mukta||||||||&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;1.6em&#8221; body_line_height=&#8221;2em&#8221; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;||17px|||&#8221; animation_style=&#8221;fold&#8221; animation_direction=&#8221;bottom&#8221; animation_intensity_fold=&#8221;5%&#8221; animation=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Changing end-user rules&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x52;||divi||400&#8243; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h6&#8243; header_font=&#8221;Mukta||||||||&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;1.6em&#8221; body_line_height=&#8221;2em&#8221; background_color=&#8221;RGBA(0,0,0,0)&#8221; custom_margin=&#8221;-5px||22px|||&#8221; animation_style=&#8221;fold&#8221; animation_direction=&#8221;bottom&#8221; animation_intensity_fold=&#8221;5%&#8221; animation=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Creating new offices&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x52;||divi||400&#8243; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h6&#8243; header_font=&#8221;Mukta||||||||&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;1.6em&#8221; body_line_height=&#8221;2em&#8221; background_color=&#8221;RGBA(0,0,0,0)&#8221; animation_style=&#8221;fold&#8221; animation_direction=&#8221;bottom&#8221; animation_intensity_fold=&#8221;5%&#8221; animation=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_class=&#8221;section__front__blog&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;9px||97px|||&#8221; top_divider_color=&#8221;#004170&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Footer&#8221; module_class=&#8221;section__gdpr__contact&#8221; _builder_version=&#8221;4.16&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_type=&#8221;circular&#8221; background_color_gradient_direction_radial=&#8221;top right&#8221; background_color_gradient_stops=&#8221;#3122b2 0%|#00ffd8 100%&#8221; background_color_gradient_start=&#8221;#3122b2&#8243; background_color_gradient_end=&#8221;#00ffd8&#8243; background_image=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/cyber-security-17.png&#8221; z_index=&#8221;10&#8243; overflow-x=&#8221;visible&#8221; overflow-y=&#8221;visible&#8221; custom_padding=&#8221;27px||7vw|||&#8221; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;2_5,3_5&#8243; make_equal=&#8221;on&#8221; module_class=&#8221;section__gdpr__contact&#8221; _builder_version=&#8221;4.16&#8243; background_color=&#8221;#ffffff&#8221; custom_margin=&#8221;-146px|auto|-2px|auto||&#8221; custom_padding=&#8221;0px||0px||true&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_vertical=&#8221;40px&#8221; box_shadow_blur=&#8221;60px&#8221; box_shadow_spread=&#8221;-8px&#8221; box_shadow_color=&#8221;rgba(10,45,97,0.48)&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;60px|40px|60px|40px|true|true&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; header_font=&#8221;|800|||||||&#8221; header_2_font=&#8221;Overpass|900|||||||&#8221; header_2_font_size=&#8221;56px&#8221; header_2_line_height=&#8221;1.1em&#8221; text_orientation=&#8221;center&#8221; header_2_font_size_tablet=&#8221;38px&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>\u0421\u0432\u044a\u0440\u0436\u0435\u0442\u0435 \u0441\u0435 \u0441 \u043d\u0430\u0441<\/h1>\n<p>[\/et_pb_text][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe090;||divi||400&#8243; icon_color=&#8221;#006ac1&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;24px&#8221; _builder_version=&#8221;4.16&#8243; header_font=&#8221;Overpass|900|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Overpass|300|||||||&#8221; body_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; icon_font_size=&#8221;24px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5><a href=\"tel:02 491 83 12\">02 491 83 12<\/a>, <a href=\"tel:+359 888 431 536\">+359 888 431 536<\/a><\/h5>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe081;||divi||400&#8243; icon_color=&#8221;#006ac1&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;24px&#8221; _builder_version=&#8221;4.16&#8243; header_level=&#8221;h5&#8243; header_font=&#8221;Overpass|700|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Overpass|300|||||||&#8221; body_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; icon_font_size=&#8221;24px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>\u0433\u0440. \u0421\u043e\u0444\u0438\u044f, \u0443\u043b. \u0412\u0438\u0441\u043a\u044f\u0440 \u043f\u043b\u0430\u043d\u0438\u043d\u0430 15-17<\/h5>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe076;||divi||400&#8243; icon_color=&#8221;#006ac1&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;24px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h5&#8243; header_font=&#8221;Overpass|700|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Overpass|300|||||||&#8221; body_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; icon_font_size=&#8221;24px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5><a href=\"mailto:office@cypro.bg\">office@cypro.bg<\/a><\/h5>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.16&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_type=&#8221;circular&#8221; background_color_gradient_direction_radial=&#8221;top right&#8221; background_color_gradient_stops=&#8221;#00f6ff 0%|#00ffbf 100%&#8221; background_color_gradient_start=&#8221;#00f6ff&#8221; background_color_gradient_end=&#8221;#00ffbf&#8221; background_image=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/cyber-security-010-1.png&#8221; background_size=&#8221;contain&#8221; background_position=&#8221;bottom_left&#8221; transform_translate_linked=&#8221;off&#8221; custom_padding=&#8221;60px|40px|60px|20%|true&#8221; custom_padding_tablet=&#8221;80px|||40px&#8221; custom_padding_phone=&#8221;&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; background_last_edited=&#8221;on|desktop&#8221; background_image_tablet=&#8221;http:\/\/zaib.sandbox.etdevs.com\/divi\/wp-content\/uploads\/sites\/2\/2019\/06\/cyber-security-11.png&#8221; background_enable_image_tablet=&#8221;on&#8221; background_position_tablet=&#8221;top_left&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;||||||||&#8221; header_font=&#8221;|800|||||||&#8221; header_2_font=&#8221;Overpass|900|||||||&#8221; header_2_font_size=&#8221;56px&#8221; header_2_line_height=&#8221;1.1em&#8221; text_orientation=&#8221;center&#8221; header_2_font_size_tablet=&#8221;38px&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; text_text_align=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>\u0417\u0430\u043f\u0430\u0437\u0435\u0442\u0435 \u0447\u0430\u0441 \u0437\u0430 \u0441\u0440\u0435\u0449\u0430<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;Overpass|300|||||||&#8221; text_text_color=&#8221;#0a2d61&#8243; text_font_size=&#8221;17px&#8221; text_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>\u0413\u043e\u0432\u043e\u0440\u0435\u0442\u0435 \u0441 \u0435\u043a\u0441\u043f\u0435\u0440\u0442, \u0437\u0430 \u0434\u0430 \u0437\u0430\u043f\u043e\u0447\u043d\u0435\u0442\u0435 \u0434\u043d\u0435\u0441!<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjI1NDE5In19@&#8221; button_text=&#8221;\u0417\u0430\u043f\u0430\u0437\u0438 \u0447\u0430\u0441&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _dynamic_attributes=&#8221;button_url&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_use_color_gradient=&#8221;on&#8221; button_bg_color_gradient_type=&#8221;circular&#8221; button_bg_color_gradient_direction=&#8221;140deg&#8221; button_bg_color_gradient_direction_radial=&#8221;top right&#8221; button_bg_color_gradient_stops=&#8221;#003070 0%|#001f4c 100%&#8221; button_bg_color_gradient_start=&#8221;#003070&#8243; button_bg_color_gradient_end=&#8221;#001f4c&#8221; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;100px&#8221; button_font=&#8221;Overpass|900||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_padding=&#8221;20px|30px|20px|30px|true|true&#8221; box_shadow_style=&#8221;preset3&#8243; box_shadow_vertical=&#8221;0px&#8221; box_shadow_blur=&#8221;0px&#8221; box_shadow_spread=&#8221;-10px&#8221; box_shadow_color=&#8221;rgba(25,114,255,0.4)&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_color__hover=&#8221;#2585b2&#8243; box_shadow_blur__hover_enabled=&#8221;on&#8221; box_shadow_blur__hover=&#8221;40px&#8221; box_shadow_vertical__hover_enabled=&#8221;on&#8221; box_shadow_vertical__hover=&#8221;10px&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Penetration testingA penetration test is a cybersecurity assessment and testing technique conducted on computer systems, networks, applications, or physical security measures to identify vulnerabilities and weaknesses that could be exploited by malicious hackers. Penetration tests assess an organization&#8217;s ability to protect its networks, applications and users from external or internal attempts to breach its security [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":332,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-25719","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.6 (Yoast SEO v25.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Penetration testing - CyPro Bulgaria Ltd.<\/title>\n<meta name=\"description\" content=\"Penetration \u0442\u0435\u0441\u0442\u044a\u0442 \u0435 \u043e\u0446\u0435\u043d\u043a\u0430 \u043d\u0430 \u0441\u0438\u0433\u0443\u0440\u043d\u043e\u0441\u0442\u0442\u0430 \u043d\u0430 \u0418\u0422 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430 \u0447\u0440\u0435\u0437 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u0435\u043d \u043e\u043f\u0438\u0442 \u0437\u0430 \u0438\u0437\u043f\u043e\u043b\u0437\u0432\u0430\u043d\u0435 \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cypro.bg\/en\/penetration-testing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Penetration testing\" \/>\n<meta property=\"og:description\" content=\"Penetration \u0442\u0435\u0441\u0442\u044a\u0442 \u0435 \u043e\u0446\u0435\u043d\u043a\u0430 \u043d\u0430 \u0441\u0438\u0433\u0443\u0440\u043d\u043e\u0441\u0442\u0442\u0430 \u043d\u0430 \u0418\u0422 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430 \u0447\u0440\u0435\u0437 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u0435\u043d \u043e\u043f\u0438\u0442 \u0437\u0430 \u0438\u0437\u043f\u043e\u043b\u0437\u0432\u0430\u043d\u0435 \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cypro.bg\/en\/penetration-testing\/\" \/>\n<meta property=\"og:site_name\" content=\"CyPro Bulgaria Ltd.\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-07T11:50:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-10.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cypro.bg\/en\/penetration-testing\/\",\"url\":\"https:\/\/cypro.bg\/en\/penetration-testing\/\",\"name\":\"Penetration testing - CyPro Bulgaria Ltd.\",\"isPartOf\":{\"@id\":\"https:\/\/cypro.bg\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cypro.bg\/en\/penetration-testing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cypro.bg\/en\/penetration-testing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-10.png\",\"datePublished\":\"2021-10-14T11:45:10+00:00\",\"dateModified\":\"2023-11-07T11:50:28+00:00\",\"description\":\"Penetration \u0442\u0435\u0441\u0442\u044a\u0442 \u0435 \u043e\u0446\u0435\u043d\u043a\u0430 \u043d\u0430 \u0441\u0438\u0433\u0443\u0440\u043d\u043e\u0441\u0442\u0442\u0430 \u043d\u0430 \u0418\u0422 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430 \u0447\u0440\u0435\u0437 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u0435\u043d \u043e\u043f\u0438\u0442 \u0437\u0430 \u0438\u0437\u043f\u043e\u043b\u0437\u0432\u0430\u043d\u0435 \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\",\"breadcrumb\":{\"@id\":\"https:\/\/cypro.bg\/en\/penetration-testing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cypro.bg\/en\/penetration-testing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cypro.bg\/en\/penetration-testing\/#primaryimage\",\"url\":\"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-10.png\",\"contentUrl\":\"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-10.png\",\"width\":1000,\"height\":1000,\"caption\":\"penetration\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cypro.bg\/en\/penetration-testing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u041d\u0430\u0447\u0430\u043b\u043e\",\"item\":\"https:\/\/cypro.bg\/en\/home\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Penetration testing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cypro.bg\/en\/#website\",\"url\":\"https:\/\/cypro.bg\/en\/\",\"name\":\"CyPro Bulgaria Ltd.\",\"description\":\"Tomorrow's protection available today\",\"publisher\":{\"@id\":\"https:\/\/cypro.bg\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cypro.bg\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cypro.bg\/en\/#organization\",\"name\":\"CyPro Bulgaria Ltd.\",\"url\":\"https:\/\/cypro.bg\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cypro.bg\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/MicrosoftTeams-image-19.png\",\"contentUrl\":\"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/MicrosoftTeams-image-19.png\",\"width\":300,\"height\":300,\"caption\":\"CyPro Bulgaria Ltd.\"},\"image\":{\"@id\":\"https:\/\/cypro.bg\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Penetration testing - CyPro Bulgaria Ltd.","description":"Penetration \u0442\u0435\u0441\u0442\u044a\u0442 \u0435 \u043e\u0446\u0435\u043d\u043a\u0430 \u043d\u0430 \u0441\u0438\u0433\u0443\u0440\u043d\u043e\u0441\u0442\u0442\u0430 \u043d\u0430 \u0418\u0422 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430 \u0447\u0440\u0435\u0437 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u0435\u043d \u043e\u043f\u0438\u0442 \u0437\u0430 \u0438\u0437\u043f\u043e\u043b\u0437\u0432\u0430\u043d\u0435 \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cypro.bg\/en\/penetration-testing\/","og_locale":"en_US","og_type":"article","og_title":"Penetration testing","og_description":"Penetration \u0442\u0435\u0441\u0442\u044a\u0442 \u0435 \u043e\u0446\u0435\u043d\u043a\u0430 \u043d\u0430 \u0441\u0438\u0433\u0443\u0440\u043d\u043e\u0441\u0442\u0442\u0430 \u043d\u0430 \u0418\u0422 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430 \u0447\u0440\u0435\u0437 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u0435\u043d \u043e\u043f\u0438\u0442 \u0437\u0430 \u0438\u0437\u043f\u043e\u043b\u0437\u0432\u0430\u043d\u0435 \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438","og_url":"https:\/\/cypro.bg\/en\/penetration-testing\/","og_site_name":"CyPro Bulgaria Ltd.","article_modified_time":"2023-11-07T11:50:28+00:00","og_image":[{"width":1000,"height":1000,"url":"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-10.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cypro.bg\/en\/penetration-testing\/","url":"https:\/\/cypro.bg\/en\/penetration-testing\/","name":"Penetration testing - CyPro Bulgaria Ltd.","isPartOf":{"@id":"https:\/\/cypro.bg\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cypro.bg\/en\/penetration-testing\/#primaryimage"},"image":{"@id":"https:\/\/cypro.bg\/en\/penetration-testing\/#primaryimage"},"thumbnailUrl":"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-10.png","datePublished":"2021-10-14T11:45:10+00:00","dateModified":"2023-11-07T11:50:28+00:00","description":"Penetration \u0442\u0435\u0441\u0442\u044a\u0442 \u0435 \u043e\u0446\u0435\u043d\u043a\u0430 \u043d\u0430 \u0441\u0438\u0433\u0443\u0440\u043d\u043e\u0441\u0442\u0442\u0430 \u043d\u0430 \u0418\u0422 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430 \u0447\u0440\u0435\u0437 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u0435\u043d \u043e\u043f\u0438\u0442 \u0437\u0430 \u0438\u0437\u043f\u043e\u043b\u0437\u0432\u0430\u043d\u0435 \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438","breadcrumb":{"@id":"https:\/\/cypro.bg\/en\/penetration-testing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cypro.bg\/en\/penetration-testing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cypro.bg\/en\/penetration-testing\/#primaryimage","url":"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-10.png","contentUrl":"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-10.png","width":1000,"height":1000,"caption":"penetration"},{"@type":"BreadcrumbList","@id":"https:\/\/cypro.bg\/en\/penetration-testing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u041d\u0430\u0447\u0430\u043b\u043e","item":"https:\/\/cypro.bg\/en\/home\/"},{"@type":"ListItem","position":2,"name":"Penetration testing"}]},{"@type":"WebSite","@id":"https:\/\/cypro.bg\/en\/#website","url":"https:\/\/cypro.bg\/en\/","name":"CyPro Bulgaria Ltd.","description":"Tomorrow's protection available today","publisher":{"@id":"https:\/\/cypro.bg\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cypro.bg\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cypro.bg\/en\/#organization","name":"CyPro Bulgaria Ltd.","url":"https:\/\/cypro.bg\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cypro.bg\/en\/#\/schema\/logo\/image\/","url":"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/MicrosoftTeams-image-19.png","contentUrl":"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/MicrosoftTeams-image-19.png","width":300,"height":300,"caption":"CyPro Bulgaria Ltd."},"image":{"@id":"https:\/\/cypro.bg\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/cypro.bg\/en\/wp-json\/wp\/v2\/pages\/25719","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cypro.bg\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cypro.bg\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cypro.bg\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cypro.bg\/en\/wp-json\/wp\/v2\/comments?post=25719"}],"version-history":[{"count":6,"href":"https:\/\/cypro.bg\/en\/wp-json\/wp\/v2\/pages\/25719\/revisions"}],"predecessor-version":[{"id":27312,"href":"https:\/\/cypro.bg\/en\/wp-json\/wp\/v2\/pages\/25719\/revisions\/27312"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cypro.bg\/en\/wp-json\/wp\/v2\/media\/332"}],"wp:attachment":[{"href":"https:\/\/cypro.bg\/en\/wp-json\/wp\/v2\/media?parent=25719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}