{"id":1583,"date":"2025-03-13T08:46:04","date_gmt":"2025-03-13T07:46:04","guid":{"rendered":"https:\/\/leaveamarkgroup.com\/?page_id=1583"},"modified":"2025-05-06T22:01:36","modified_gmt":"2025-05-06T20:01:36","slug":"pentest","status":"publish","type":"page","link":"https:\/\/leaveamarkgroup.com\/en\/ciso-services\/pentest\/","title":{"rendered":"Pentest"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1583\" class=\"elementor elementor-1583\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-79ab06c e-flex e-con-boxed e-con e-parent\" data-id=\"79ab06c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-0f6f10b e-con-full e-flex e-con e-child\" data-id=\"0f6f10b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-94301fc elementor-widget elementor-widget-heading\" data-id=\"94301fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Pentest<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c2acf6 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"2c2acf6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Fokusset p\u00e5 IT-sikkerhed er de seneste \u00e5r steget markant. Pentest og s\u00e5rbarhedsscanning er et af de relevante tiltag, som kan beskytte en virksomheds infrastruktur.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-174c415 elementor-align-left elementor-widget elementor-widget-breadcrumbs\" data-id=\"174c415\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p id=\"breadcrumbs\"><span><span><a href=\"https:\/\/leaveamarkgroup.com\/\">Forside<\/a><\/span><\/span><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-039c7a7 elementor-hidden-mobile e-flex e-con-boxed e-con e-child\" data-id=\"039c7a7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e687cbe elementor-widget elementor-widget-button\" data-id=\"e687cbe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"mailto:konsulent@leaveamarkgroup.com\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-envelope\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">konsulent@leaveamarkgroup.com<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4284614 elementor-widget elementor-widget-button\" data-id=\"4284614\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"tel:+4553527000\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-phone\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">+45 535 27000<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2bec2e elementor-view-stacked elementor-shape-circle elementor-widget elementor-widget-icon\" data-id=\"d2bec2e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<a class=\"elementor-icon\" href=\"https:\/\/www.facebook.com\/Leaveamarkgroup\" target=\"_blank\">\n\t\t\t<i aria-hidden=\"true\" class=\"fab fa-facebook-f\"><\/i>\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1403090 elementor-view-stacked elementor-shape-circle elementor-widget elementor-widget-icon\" data-id=\"1403090\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<a class=\"elementor-icon\" href=\"https:\/\/www.linkedin.com\/company\/leave-a-mark-consulting-group-aps\/\" target=\"_blank\">\n\t\t\t<i aria-hidden=\"true\" class=\"fab fa-linkedin-in\"><\/i>\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8a57275 e-flex e-con-boxed e-con e-parent\" data-id=\"8a57275\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-56e6e50 e-con-full e-flex e-con e-child\" data-id=\"56e6e50\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1f8c118 e-con-full e-flex e-con e-child\" data-id=\"1f8c118\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0aa5de8 elementor-widget elementor-widget-heading\" data-id=\"0aa5de8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Hvad er en pentest?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5030e88 elementor-widget elementor-widget-text-editor\" data-id=\"5030e88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>En penetrationstest, ofte kaldet en \u201dpentest\u201d, er et autoriseret, simuleret cyberangreb, der anvender specifikke testmetoder til at identificere s\u00e5rbarheder i et system og vurdere dets sikkerhedsniveau. Penetrationstests fungerer som en sikkerhedskontrol, der sikrer, at softwaren er beskyttet enten f\u00f8r den implementeres i produktion eller som en del af en l\u00f8bende risikovurdering.<\/p><p>Penetrationstests er en central del af nye direktiver og forordninger, der har til form\u00e5l at \u00f8ge IT-sikkerheden i s\u00e6rligt udsatte brancher og virksomhedstyper. Disse krav er blevet indf\u00f8rt for at sikre, at virksomhederne aktivt arbejder med at identificere og afhj\u00e6lpe s\u00e5rbarheder i deres IT-systemer.<\/p><p>Dette er kr\u00e6vet i DORA (Digital Operational Resilience Act), som specifikt henvender sig til finansielle institutioner. I henhold til DORA er det et krav, at finansielle virksomheder udf\u00f8rer en penetrationstest mindst \u00e9n gang om \u00e5ret for at sikre, at deres digitale infrastruktur er modstandsdygtig over for potentielle cyberangreb. Dette \u00e5rlige krav skal hj\u00e6lpe med at identificere og afhj\u00e6lpe s\u00e5rbarheder, f\u00f8r de kan udnyttes af trusselsakt\u00f8rer, og derved styrke den overordnede sikkerhed i den finansielle sektor.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ccd5712 elementor-widget elementor-widget-heading\" data-id=\"ccd5712\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Fordele ved pentest:<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b6bcb57 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"b6bcb57\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-minus\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Identifikation af reelle s\u00e5rbarheder ved simulering af \u00e6gte cyberangreb<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-minus\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Realistisk vurdering af sikkerhedsniveau <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-minus\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Overholdelse af lovkrav og standarder<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-minus\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Test af incident response-beredskab<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-minus\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Validering af sikkerhedsforanstaltninger<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f8d9486 e-flex e-con-boxed e-con e-parent\" data-id=\"f8d9486\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ec025cb e-con-full e-flex e-con e-child\" data-id=\"ec025cb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-34dd504 elementor-widget elementor-widget-heading\" data-id=\"34dd504\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Hvad er en s\u00e5rbarhedsscanning?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-97a043b elementor-widget elementor-widget-text-editor\" data-id=\"97a043b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>En s\u00e5rbarhedsscanning er en gennemgang af din virksomheds IT-infrastruktur og applikationer for at identificere potentielle svagheder og s\u00e5rbarheder. Disse svagheder kan udnyttes af ondsindede akt\u00f8rer, som hackere, hvilket kan resultere i datatab, systemnedbrud eller \u00f8konomiske tab. Form\u00e5let med en s\u00e5rbarhedsscanning er at opdage og rangere disse s\u00e5rbarheder, s\u00e5 de kan udbedres, f\u00f8r de bliver udnyttet af hackere.<\/p><p>P\u00e5 grund af risikoen for potentielle sikkerhedstrusler er det et krav eller en st\u00e6rk anbefaling i mange sikkerhedsstandarder, herunder CIS18 (Center for Internet Security Controls), at udf\u00f8re regelm\u00e6ssige s\u00e5rbarhedsscanninger. Specifikt foreskriver CIS18, at virksomheder som minimum skal gennemf\u00f8re en s\u00e5rbarhedsscanning mindst \u00e9n gang om m\u00e5neden. Dette krav er indf\u00f8rt for at sikre, at nyopdagede s\u00e5rbarheder identificeres og h\u00e5ndteres rettidigt, inden de kan udnyttes af angribere. M\u00e5nedlige scanninger er med til at sikre en kontinuerlig vurdering af sikkerhedsniveauet og underst\u00f8tter en proaktiv tilgang til IT-sikkerhed, hvilket hj\u00e6lper med at reducere risikoen for databrud og systemnedbrud.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5b53eb8 e-con-full e-flex e-con e-child\" data-id=\"5b53eb8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d4ba44d e-flex e-con-boxed e-con e-parent\" data-id=\"d4ba44d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-0d40b99 e-con-full e-flex e-con e-child\" data-id=\"0d40b99\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-65ad277 elementor-widget elementor-widget-heading\" data-id=\"65ad277\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">HVORDAN UDF\u00d8RES EN PENTEST I HENHOLD TIL DORA?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dede816 elementor-widget elementor-widget-text-editor\" data-id=\"dede816\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Et krav i forordningen er gennemf\u00f8relsen af grundl\u00e6ggende test af digital operationel robusthed ved hj\u00e6lp af Threat-Led Penetration Tests (TLPT). Her vil der anvendes TLPT til at evaluere virksomhedens infrastruktur med det form\u00e5l at identificere og udnytte s\u00e5rbarheder. Form\u00e5let med TLPT er at simulere angreb fra en potentiel hacker eller ondsindet akt\u00f8r for at afsl\u00f8re svagheder og identificere omr\u00e5der, hvor der er risiko for uautoriseret adgang eller datatab.<\/p><p>Vi har tidligere erfaring med udf\u00f8relse af lignende pentests i forskellige sektorer.<\/p><p>Har du lyst til at l\u00e6se mere om implementering processen af DORA?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf67d87 elementor-widget elementor-widget-button\" data-id=\"bf67d87\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/leaveamarkgroup.com\/en\/services\/dora-finansiel-standard\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">L\u00e6s mere om DORA<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1daf15e e-flex e-con-boxed e-con e-parent\" data-id=\"1daf15e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2d62ce9 e-con-full e-flex e-con e-child\" data-id=\"2d62ce9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4eff54f elementor-widget elementor-widget-heading\" data-id=\"4eff54f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">PRIS EKSEMPEL FOR S\u00e5rbarhedsscanning<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ce0c6f elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"4ce0c6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Fast pris for gennemgang af 3 IP \/ dom\u00e6ner DKK 1950,- \/pr m\u00e5ned ex moms<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-08f17c3 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"08f17c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Vores automatiserede scanninger indeholder som minimum f\u00f8lgende:<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-minus\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Ops\u00e6tning af k\u00f8rsel af op til 3 IP'er\/dom\u00e6ner<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-minus\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Host\/Domain response scanning<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-minus\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Port scanning<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-minus\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Header scanning (Clickjacking)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-minus\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">TLS\/SSL scanning<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-minus\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Robots scanning<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-minus\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">DNS setting<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-minus\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Dark web-scanning<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-minus\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">\u00c6ndringer siden sidst scan<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-minus\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Manuel gennemgang af rapporten<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-minus\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Online adgang til rapporter (gemmes i 24 m\u00e5neder til audit)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-minus\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Rapport data er fuldt krypteret med st\u00e6rk kryptering<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-minus\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Opdatering af scanning systemet i forhold til kendte s\u00e5rbarheder.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ae5cc1e e-con-full e-flex e-con e-child\" data-id=\"ae5cc1e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-32443c9 e-flex e-con-boxed e-con e-parent\" data-id=\"32443c9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b10b179 e-con-full e-flex e-con e-child\" data-id=\"b10b179\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;],&quot;sticky_offset&quot;:150,&quot;sticky_parent&quot;:&quot;yes&quot;,&quot;sticky_effects_offset&quot;:0,&quot;sticky_anchor_link_offset&quot;:0}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4313578 elementor-widget elementor-widget-heading\" data-id=\"4313578\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">De mest stillede sp\u00f8rgsm\u00e5l \/ FAQ<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-906414c elementor-widget elementor-widget-text-editor\" data-id=\"906414c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Pentest tester systemers sikkerhed dybt, mens s\u00e5rbarhedsscanning identificerer kendte svagheder. Begge anbefales \u00e5rligt, og ekstern hj\u00e6lp \u00f8ger effektiviteten i at opdage trusler.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e96bce7 elementor-widget elementor-widget-button\" data-id=\"e96bce7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#kontakt\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Kontakt os i dag<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-80b9d5f e-con-full e-flex e-con e-child\" data-id=\"80b9d5f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f4a5913 e-con-full e-flex e-con e-child\" data-id=\"f4a5913\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8d1bfff elementor-widget elementor-widget-heading\" data-id=\"8d1bfff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Hvad er forskellen mellem en pentest og s\u00e5rbarhedsscanning?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b3269f9 elementor-widget elementor-widget-text-editor\" data-id=\"b3269f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>En s\u00e5rbarhedsscanning og en penetrationstest (pentest) adskiller sig ved deres form\u00e5l og metodik. En s\u00e5rbarhedsscanning er en automatiseret proces, der bruges til at identificere kendte s\u00e5rbarheder i en virksomheds IT-infrastruktur og applikationer. Den er typisk bred og overfladisk, og dens form\u00e5l er at opdage s\u00e5 mange potentielle svagheder som muligt.<\/p><p>En penetrationstest, derimod, er en mere m\u00e5lrettet og dybdeg\u00e5ende tilgang, hvor et simuleret angreb udf\u00f8res af sikkerhedseksperter for at finde og udnytte s\u00e5rbarheder. Pentesten vurderer ikke kun tilstedev\u00e6relsen af s\u00e5rbarheder, men tester ogs\u00e5, hvordan de kan udnyttes, og vurderer systemets faktiske sikkerhedsniveau under et angreb.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-904ab55 e-con-full e-flex e-con e-child\" data-id=\"904ab55\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-75673ca elementor-widget elementor-widget-heading\" data-id=\"75673ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Hvor hyppigt b\u00f8r man f\u00e5 foretaget en pentest &amp; s\u00e5rbarhedscanning?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06cf4fc elementor-widget elementor-widget-text-editor\" data-id=\"06cf4fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Hyppigheden af en penetrationstest (pentest) og en s\u00e5rbarhedsscanning afh\u00e6nger af flere faktorer, herunder virksomhedens risikoprofil, sikkerhedskrav, og branchestandarder.<\/p><p>S\u00e5rbarhedsscanninger b\u00f8r generelt udf\u00f8res regelm\u00e6ssigt, ofte mindst en gang om m\u00e5neden, da de er automatiserede og relativt lette at gennemf\u00f8re. Dette sikrer, at nyopdagede s\u00e5rbarheder hurtigt identificeres og kan udbedres l\u00f8bende.<\/p><p>Penetrationstests b\u00f8r typisk udf\u00f8res mindst \u00e9n gang om \u00e5ret eller oftere, hvis der er sket v\u00e6sentlige \u00e6ndringer i IT-milj\u00f8et, s\u00e5som nye systemimplementeringer, opdateringer, eller \u00e6ndringer i netv\u00e6rksinfrastrukturen. I h\u00f8jriskosektorer som finanssektoren, hvor kravene kan v\u00e6re mere stringente (f.eks. under DORA), kan det v\u00e6re et krav at udf\u00f8re penetrationstests \u00e5rligt for at sikre modstandskraft mod cyberangreb.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bde47f9 e-con-full e-flex e-con e-child\" data-id=\"bde47f9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f549be elementor-widget elementor-widget-heading\" data-id=\"4f549be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Hvorfor b\u00f8r man f\u00e5 hj\u00e6lp til ekstern s\u00e5rbarhedsscanning?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b99ec29 elementor-widget elementor-widget-text-editor\" data-id=\"b99ec29\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Man b\u00f8r f\u00e5 hj\u00e6lp til ekstern s\u00e5rbarhedsscanning, fordi eksterne sikkerhedseksperter kan tilbyde en objektiv og upartisk vurdering af virksomhedens IT-sikkerhed. Eksterne konsulenter har ofte specialiseret viden og erfaring med de nyeste trusler og s\u00e5rbarheder samt adgang til avancerede v\u00e6rkt\u00f8jer og teknologier, der kan identificere sikkerhedsrisici, som interne teams m\u00e5ske overser.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-af9cdeb e-con-full e-flex e-con e-child\" data-id=\"af9cdeb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ef4ac7 elementor-widget elementor-widget-heading\" data-id=\"2ef4ac7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Hvordan udf\u00f8res en pentest &amp; s\u00e5rbarhedsscanning?\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e66934 elementor-widget elementor-widget-text-editor\" data-id=\"7e66934\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>S\u00e5rbarhedsscanning begynder typisk med en planl\u00e6gningsfase, hvor de systemer og netv\u00e6rk, der skal unders\u00f8ges, identificeres. Herefter bruges automatiserede scanningv\u00e6rkt\u00f8jer til at gennems\u00f8ge systemerne for kendte s\u00e5rbarheder, s\u00e5som for\u00e6ldet software, manglende sikkerhedsopdateringer, misconfigurations, og andre sikkerhedshuller. Resultaterne fra scanningen analyseres for at identificere potentielle risici og svagheder. Endelig udarbejdes en rapport, der indeholder en oversigt over de fundne s\u00e5rbarheder, deres alvorlighedsgrad, og anbefalinger til, hvordan de kan udbedres.<\/p><p>Penetrationstests, derimod, f\u00f8lger en mere omfattende og m\u00e5lrettet proces. F\u00f8rst er der en forberedelsesfase, hvor m\u00e5lene for testen defineres, og de specifikke systemer og applikationer, der skal testes, identificeres. Dette efterf\u00f8lges af en informationsindsamlingsfase, hvor testeren indsamler s\u00e5 mange oplysninger som muligt om milj\u00f8et, s\u00e5som netv\u00e6rket, operativsystemer, og andre sikkerhedsforanstaltninger.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0ea7a97 e-flex e-con-boxed e-con e-parent\" data-id=\"0ea7a97\" data-element_type=\"container\" data-e-type=\"container\" id=\"kontakt\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8719acd e-con-full e-flex e-con e-child\" data-id=\"8719acd\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-60d64fd e-con-full e-flex e-con e-child\" data-id=\"60d64fd\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8f4cf4d elementor-widget elementor-widget-heading\" data-id=\"8f4cf4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Brug for hj\u00e6lp til s\u00e5rbarhedsscanning eller pentest?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e00c38 elementor-button-align-start elementor-widget elementor-widget-form\" data-id=\"2e00c38\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;N\\u00e6ste&quot;,&quot;step_previous_label&quot;:&quot;Tidligere&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" name=\"Kontakt\" aria-label=\"Kontakt\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"1583\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"2e00c38\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"Leave A Mark Consulting Group\" \/>\n\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-above\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-100 elementor-field-required elementor-mark-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tNavn\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Dit navn\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-field_259b0e7 elementor-col-100 elementor-field-required elementor-mark-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_259b0e7\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tFirmanavn\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[field_259b0e7]\" id=\"form-field-field_259b0e7\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Hvad er firmanavnet?\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-50 elementor-field-required elementor-mark-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tEmail\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Din email\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-tel elementor-field-group elementor-column elementor-field-group-field_de5facd elementor-col-50 elementor-field-required elementor-mark-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_de5facd\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tTelefon\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<input size=\"1\" type=\"tel\" name=\"form_fields[field_de5facd]\" id=\"form-field-field_de5facd\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Dit nummer\" required=\"required\" pattern=\"[0-9()#&amp;+*-=.]+\" title=\"Only numbers and phone characters (#, -, *, etc) are accepted.\">\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-textarea elementor-field-group elementor-column elementor-field-group-message elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-message\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tBesked\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t<textarea class=\"elementor-field-textual elementor-field  elementor-size-sm\" name=\"form_fields[message]\" id=\"form-field-message\" rows=\"3\" placeholder=\"Har du noget du vil tilf\u00f8je?\"><\/textarea>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-html elementor-field-group elementor-column elementor-field-group-field_c0b22c3 elementor-col-100\">\n\t\t\t\t\tVed at indsende din besked, giver du samtykke til, at Leave A Mark Consulting Group m\u00e5 gemme og behandle ovenst\u00e5ende oplysninger. <br><br>\n\nBem\u00e6rk, at dine oplysninger ikke anvendes til markedsf\u00f8ring, men udelukkende i relation til din henvendelse. \t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-arrow-right\"><\/i>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Send besked<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<input\n                    class=\"apbct_special_field apbct_email_id__elementor_form\"\n                    name=\"apbct__email_id__elementor_form\"\n                    aria-label=\"apbct__label_id__elementor_form\"\n                    type=\"text\" size=\"30\" maxlength=\"200\" autocomplete=\"off\"\n                    value=\"\"\n                \/><\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Pentest Fokusset p\u00e5 IT-sikkerhed er de seneste \u00e5r steget markant. Pentest og s\u00e5rbarhedsscanning er et af de relevante tiltag, som kan beskytte en virksomheds infrastruktur. konsulent@leaveamarkgroup.com +45 535 27000 Hvad er en pentest? En penetrationstest, ofte kaldet en \u201dpentest\u201d, er et autoriseret, simuleret cyberangreb, der anvender specifikke testmetoder til at identificere s\u00e5rbarheder i et system [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1581,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-1583","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Pentest og s\u00e5rbarhedsscanning \u2013 opdag sikkerhedshuller<\/title>\n<meta name=\"description\" content=\"F\u00e5 indsigt i din IT-sikkerhed med pentest og s\u00e5rbarhedsscanning \u2013 opdag svagheder og overhold krav fra bl.a. DORA og CIS18.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/leaveamarkgroup.com\/en\/ciso-services\/pentest\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pentest og s\u00e5rbarhedsscanning \u2013 opdag sikkerhedshuller\" \/>\n<meta property=\"og:description\" content=\"F\u00e5 indsigt i din IT-sikkerhed med pentest og s\u00e5rbarhedsscanning \u2013 opdag svagheder og overhold krav fra bl.a. DORA og CIS18.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/leaveamarkgroup.com\/en\/ciso-services\/pentest\/\" \/>\n<meta property=\"og:site_name\" content=\"Leave A Mark Consulting Group\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-06T20:01:36+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/leaveamarkgroup.com\\\/ciso-services\\\/pentest\\\/\",\"url\":\"https:\\\/\\\/leaveamarkgroup.com\\\/ciso-services\\\/pentest\\\/\",\"name\":\"Pentest og s\u00e5rbarhedsscanning \u2013 opdag sikkerhedshuller\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/leaveamarkgroup.com\\\/#website\"},\"datePublished\":\"2025-03-13T07:46:04+00:00\",\"dateModified\":\"2025-05-06T20:01:36+00:00\",\"description\":\"F\u00e5 indsigt i din IT-sikkerhed med pentest og s\u00e5rbarhedsscanning \u2013 opdag svagheder og overhold krav fra bl.a. DORA og CIS18.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/leaveamarkgroup.com\\\/ciso-services\\\/pentest\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/leaveamarkgroup.com\\\/ciso-services\\\/pentest\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/leaveamarkgroup.com\\\/ciso-services\\\/pentest\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Forside\",\"item\":\"https:\\\/\\\/leaveamarkgroup.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISO services\",\"item\":\"https:\\\/\\\/leaveamarkgroup.com\\\/ciso-services\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Pentest\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/leaveamarkgroup.com\\\/#website\",\"url\":\"https:\\\/\\\/leaveamarkgroup.com\\\/\",\"name\":\"Leave A Mark Consulting Group\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/leaveamarkgroup.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/leaveamarkgroup.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/leaveamarkgroup.com\\\/#organization\",\"name\":\"Leave A Mark Consulting Group\",\"url\":\"https:\\\/\\\/leaveamarkgroup.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/leaveamarkgroup.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/leaveamarkgroup.com\\\/wp-content\\\/uploads\\\/logo-primary.svg\",\"contentUrl\":\"https:\\\/\\\/leaveamarkgroup.com\\\/wp-content\\\/uploads\\\/logo-primary.svg\",\"width\":432,\"height\":195,\"caption\":\"Leave A Mark Consulting Group\"},\"image\":{\"@id\":\"https:\\\/\\\/leaveamarkgroup.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/leave-a-mark-consulting-group-aps\\\/?viewAsMember=true\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pentest og s\u00e5rbarhedsscanning \u2013 opdag sikkerhedshuller","description":"F\u00e5 indsigt i din IT-sikkerhed med pentest og s\u00e5rbarhedsscanning \u2013 opdag svagheder og overhold krav fra bl.a. DORA og CIS18.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/leaveamarkgroup.com\/en\/ciso-services\/pentest\/","og_locale":"en_GB","og_type":"article","og_title":"Pentest og s\u00e5rbarhedsscanning \u2013 opdag sikkerhedshuller","og_description":"F\u00e5 indsigt i din IT-sikkerhed med pentest og s\u00e5rbarhedsscanning \u2013 opdag svagheder og overhold krav fra bl.a. DORA og CIS18.","og_url":"https:\/\/leaveamarkgroup.com\/en\/ciso-services\/pentest\/","og_site_name":"Leave A Mark Consulting Group","article_modified_time":"2025-05-06T20:01:36+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/leaveamarkgroup.com\/ciso-services\/pentest\/","url":"https:\/\/leaveamarkgroup.com\/ciso-services\/pentest\/","name":"Pentest og s\u00e5rbarhedsscanning \u2013 opdag sikkerhedshuller","isPartOf":{"@id":"https:\/\/leaveamarkgroup.com\/#website"},"datePublished":"2025-03-13T07:46:04+00:00","dateModified":"2025-05-06T20:01:36+00:00","description":"F\u00e5 indsigt i din IT-sikkerhed med pentest og s\u00e5rbarhedsscanning \u2013 opdag svagheder og overhold krav fra bl.a. DORA og CIS18.","breadcrumb":{"@id":"https:\/\/leaveamarkgroup.com\/ciso-services\/pentest\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/leaveamarkgroup.com\/ciso-services\/pentest\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/leaveamarkgroup.com\/ciso-services\/pentest\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Forside","item":"https:\/\/leaveamarkgroup.com\/"},{"@type":"ListItem","position":2,"name":"CISO services","item":"https:\/\/leaveamarkgroup.com\/ciso-services\/"},{"@type":"ListItem","position":3,"name":"Pentest"}]},{"@type":"WebSite","@id":"https:\/\/leaveamarkgroup.com\/#website","url":"https:\/\/leaveamarkgroup.com\/","name":"Leave A Mark Consulting Group","description":"","publisher":{"@id":"https:\/\/leaveamarkgroup.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/leaveamarkgroup.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/leaveamarkgroup.com\/#organization","name":"Leave A Mark Consulting Group","url":"https:\/\/leaveamarkgroup.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/leaveamarkgroup.com\/#\/schema\/logo\/image\/","url":"https:\/\/leaveamarkgroup.com\/wp-content\/uploads\/logo-primary.svg","contentUrl":"https:\/\/leaveamarkgroup.com\/wp-content\/uploads\/logo-primary.svg","width":432,"height":195,"caption":"Leave A Mark Consulting Group"},"image":{"@id":"https:\/\/leaveamarkgroup.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/leave-a-mark-consulting-group-aps\/?viewAsMember=true"]}]}},"_links":{"self":[{"href":"https:\/\/leaveamarkgroup.com\/en\/wp-json\/wp\/v2\/pages\/1583","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/leaveamarkgroup.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/leaveamarkgroup.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/leaveamarkgroup.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/leaveamarkgroup.com\/en\/wp-json\/wp\/v2\/comments?post=1583"}],"version-history":[{"count":20,"href":"https:\/\/leaveamarkgroup.com\/en\/wp-json\/wp\/v2\/pages\/1583\/revisions"}],"predecessor-version":[{"id":2689,"href":"https:\/\/leaveamarkgroup.com\/en\/wp-json\/wp\/v2\/pages\/1583\/revisions\/2689"}],"up":[{"embeddable":true,"href":"https:\/\/leaveamarkgroup.com\/en\/wp-json\/wp\/v2\/pages\/1581"}],"wp:attachment":[{"href":"https:\/\/leaveamarkgroup.com\/en\/wp-json\/wp\/v2\/media?parent=1583"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}