What Can Go Wrong On An External Penetration Test?

SIG Cyber offers comprehensive external penetration testing for higher education institutions.

While everyone hopes that when they conduct an external penetration test everything goes according to plan. The truth is that sometimes, that’s just not the case. There are a litany of issues that can pop up during penetration testing in general. While 95% of the time things go smoothly, you should be fully aware of what can go wrong

Federal Financial Aid Data Undergoing Critical Changes

SIG can help your higher ed institution with the new Federal Financial Aid Changes

With Federal financial aid data undergoing critical changes, do not assume you can continue to do what you have always done. Systems and data integrations build up over time. We continually work towards the goal of enhancing student and staff experiences, breaking down barriers whenever possible. In these iterative product lifecycles, there come times to pause, reassessing […]

Our External Penetration Testing Methodology

SIG Cyber offers comprehensive external penetration testing for higher ed institutions.

One of the primary questions we get from clients is about our external penetration testing methodology. This is a great question, and usually is an indication that our potential customer is doing their due diligence. After all, you are about to let someone hack your perimeter

How Long Does a Web Application Penetration Test Take?

SIG Cyber offers comprehensive web application penetration testing services for higher education institutions.

One of the first questions we hear often is, “How long does it take?” And, yes, “it depends” is part of the answer. However, we wanted to at least give you a rough idea of how long a web application penetration test takes for planning purposes. This blog also covers factors that go into the timeline, and how that time is spent.

Our Web Application Penetration Testing Methodology

SIG Cyber offers comprehensive web application penetration testing services for higher ed institutions.

One of the primary questions we get when it comes to web application penetration testing (including mobile applications and APIs) is about what methodology we use. Of course it’s natural for people to wonder how we’re going to go about testing their assets, and somewhat surprisingly, it can be hard to get this kind of information from your pen testers.

When Should I Penetration Test a New Web Application?

SIG Cyber offers comprehensive web application penetration testing for higher education institutions.

Over the years, clients have asked us when it’s the right time to penetration test a new web application. We like this question, because it recognizes the fact that a new application needs a penetration test. You never want to roll out a new application to production without testing it. If a new web application gets compromised it not only puts the application is at risk, but also all the systems in your environment.

SIG, Salesforce, and Personalized Marketing Engagement

SIG offers comprehensive Salesforce consulting services for higher ed institutions.

After the pandemic, the University of Hawai’i at Manoa was dealing with many of the same challenges as other universities across the country with low enrollment numbers. They engaged SIG to help them use Salesforce to boost their enrollment and automate data processes. Hear Garret Yoshimi, VP for Information Technology and CIO, from the University […]

Top 5 Reasons Web Penetration Testing Quotes are Different

SIG Cyber offers comprehensive web application penetration testing with standardized and fair quotes.

Crazy variations in pricing between companies is one of the most common complaints we hear from clients comparing penetration testing quotes. This isn’t a new problem and it can be frustrating. Especially when you’re trying to compare services that are more technical in nature. Information security consulting engagements or penetration testing may require some in-depth industry knowledge or past experience to understand exactly what your money is buying. This blog will explore some of the contributing factors to the variations in penetration testing quotes.