Lost or Stolen Laptop Assessment

Our advanced penetration testing improves your security and keeps you in control.

What is a stolen laptop Assessment?

A Lost or Stolen Laptop Assessment is a test to determine how much information can be gained from a mislaid laptop, which ranges from almost nothing, (which would be very unusual), right up to all the information held locally, including details to achieve remote access to a company’s internal infrastructure.

Mobile computing and communications devices, such as Laptops, tablets and Smartphones are massively adopted by large organisations and SMEs for their portability, functionality, and usability.

If these devices are lost or stolen, it is vital that the interception of such a device cannot present a risk of data leakage or unauthorised access to corporate network resources.

Our Approach

A Lost or Stolen Laptop assessment is usually based on a typical user’s laptop bag, including all the information that would typically be in the same bag as the laptop. The scope is something that can be discussed over a review call and subject to different client requirements.

The best test is to simulate a real-world scenario, rather than to analyse a laptop that has been separated from its owner, had its post-it notes removed, notebooks retained and anything else which would aid an attacker in trying to gain access to the device itself and onwards to the corporate network.

Overview

The following high-level areas are analysed in this assessment:

• Insecure storage or logging of passwords

• Cached or unlocked credentials

• Missing Security patches

• Boot process analysis

• Device/Disk Encryption

• Password brute force attack/weak password policies

• Sensitive data disclosure

• Information Leakage

• Local Security Policy Circumvention

Analysis and Exploitation

The assessment commences, analysing the findings and attempts made, where safe and permitted, to exploit any vulnerabilities discovered. If access is gained to the laptop, attempts will be made to access key systems on the internal network.

Reporting

The assessment is documented in a simple, easily digestible, format

Let’s Work Together to Create Your Perfect Test.

Let’s Make Things Happen

Fill the form in and one of our team will be in touch for a no-obligation discussion or quote regarding your requirements –

“It was obvious, very quickly, that the Cognisys team knew exactly what they were doing. The speed that they uncovered some major issues justified our selection of them. I’d be more than happy to recommend them.”

Dan Mitchell

Head of IT – Clarion Solicitors

Alex Martin

Cyber Security Expert
Thank you for your message. We will be in contact soon.
There was an error trying to send your message. Please try again later.

By submitting my data I agree to be contacted