Some of the identified vulnerabilities have no solution - What should we do?
In the first instance, you should reach out to your IT organization or your IT service provider. They should be able to assist you in addressing your vulnerabilities. If you require further assistance, we can help you for a small additional fee. Please fill out the form below.
Related Articles
We have addressed identified vulnerabilities and would like to conduct another website inspection - how do we proceed?
When you or your IT provider have fixed any vulnerabilities, it's always good to ensure that they have been addressed by conducting another website inspection. If you would like to do this, please send us a request via the form at the bottom of the ...
What does DMARC mean?
DKIM (DomainKeys Identified Mail) provides an additional layer of protection and security for the recipient, ensuring that your message has not been tampered with during its journey.
What is a vulnerability?
A vulnerability is a type of security risk that can exist in a computer or a computer system. It could be a design flaw or a software error that allows an attacker to exploit the system in a way that wasn't intended. By exploiting a vulnerability, an ...
I've received an email about leaked information, but there's no information about the source.
Sometimes, certain pieces of information can be identified as leaked (exposed) without the original source being available. Unfortunately, we're unable to investigate this further. As the recipient of this information, what you can do is, if the ...
What is a website inspection?
A website inspection is a tool primarily designed to test whether known technical vulnerabilities exist on your website. The website is scanned, and any vulnerabilities present are compiled into a report. Additionally, recommendations or suggestions ...