Founded 2009 · New York City

The secret weapon behind
elite cybersecurity programs.

Grid32 is a boutique penetration testing firm trusted by financial institutions, law firms, Fortune 500 subsidiaries, and compliance-driven organizations who demand more than a scan report — they demand results.

15+
Years Established
1,000+
Tests Completed
100%
U.S.-Based Experts
0
Service Disruptions
Trusted By
Corcoran Real Estate Carlson Capital Masterworks Withum Business Insider Archdiocese of New York City of Newark Restore Hyper Wellness
What We Do

Comprehensive penetration
testing & red team services

Every engagement is conducted by certified senior engineers — not junior analysts running automated scans. We are specialists. Pentesting is all we do.

Network Penetration Testing

External, internal, and wireless network assessments that expose how deeply an attacker can penetrate your infrastructure using real-world techniques.

Web Application Penetration Testing

Manual, OWASP-aligned application testing covering front-end exposure, back-end architecture, APIs, and internal credentialed access — not just surface-level scanning.

Phishing & Social Engineering

Targeted campaigns across email, phone, SMS, and physical access that test your human layer — the most commonly exploited attack vector in real breaches.

Compliance-Driven Assessments

Testing scoped to satisfy SOC 2, PCI DSS, HIPAA, FINRA, GLBA, CMMC, and other regulatory frameworks — with reporting built for auditors, boards, and C-suite stakeholders.

Vulnerability Assessments

Ongoing vulnerability identification and risk ranking across your environment — ideal for quarterly or semi-annual cycles and organizations building mature security programs.

White-Label & Partner Program

MSPs, accounting firms, and IT consultants: offer enterprise-grade pentesting under your own brand with zero hiring, zero overhead, and competitive margins.

Why Grid32

The independent security audit your
stakeholders actually trust

01

Manual-first methodology

We don't hand you a scanner report. Our engineers conduct hands-on, manual testing that finds what automated tools consistently miss — complex chained vulnerabilities, logic flaws, and privilege escalation paths that only human expertise can uncover.

02

Zero service disruptions — ever

Our methodology is engineered around the operational safety of your environment. We have conducted over a thousand engagements without a single unintended service disruption. Your business runs; we work around it.

03

Reporting for every audience

Board-ready executive summaries. CISO-level detailed reports. Granular technical findings for your IT and security engineers. Attestation documents for clients and auditors. Every deliverable serves its reader.

04

Elite, certified, U.S.-based team

Our engineers hold CISSP, GPEN, GXPN, OSCP, OSCE, CDPSE, and CCIE certifications. All staff undergo full background checks. We come from backgrounds at the DoD, DoE, NASA, Cisco, and National Grid.

05

Your long-term security partner

Many of our clients have tested with us for years, returning annually, semi-annually, or quarterly as their security programs mature. We become advisers — not just a one-time vendor with a PDF and an invoice.

06

Simple, transparent pricing

Build and price your own engagement online with our quote tool. No surprises. No sales pressure. Your SOW is reviewed, confirmed, and scheduled — we handle everything from there.

How It Works

A proven process.
A clear roadmap to resolution.

01

Scope & Quote

Define your environment using our online quote builder. No sales calls required to get started.

02

Reconnaissance

Our team performs active and passive intelligence gathering on your target environment.

03

Exploitation & Escalation

We attempt to exploit discovered vulnerabilities and escalate privileges to reveal true breach depth.

04

Detailed Reporting

Receive tiered reports with severity rankings, remediation roadmaps, and attestation documents.

Compliance Coverage

Testing for the frameworks
your auditors require

Our engagements are scoped and documented to satisfy the most demanding regulatory environments.

SOC 2
PCI DSS
HIPAA
FINRA
GLBA
SOX
GDPR
CCPA
CMMC
NIST CSF
Client Testimonials

What our clients say

We test annually and were genuinely surprised by the issues Grid32 uncovered that others had missed. Our network has hit a new level of security thanks to their thorough and methodical approach.

CISO — Financial Institution

The entire process was professional and the results were impressive. The executive summary was perfect for our Board, and they laid out a clear process for making improvements to further secure our environment.

CIO — Law Firm

I am very pleased with the engagement and we made the right choice selecting Grid32 as our pentesting partner. Their report gave us exactly what we needed for our auditors. Highly recommended.

Audit Director — Federal Bank
Ready to Start

Know your exposure.
Close the gaps.

Use our online quote builder to scope and price your engagement in minutes — or reach out directly and we'll scope it with you.

Our Services

Penetration Testing & Security Assessment Services

We are pentest specialists. Every engagement is led by senior certified engineers using hands-on manual techniques — not automated scans. The results speak for themselves.

Core Services

Choose your testing scope

Network Penetration Testing

External network, internal network, and wireless penetration tests that expose real breach depth across your entire infrastructure.

Web Application Penetration Testing

Manual OWASP-aligned assessments of web applications, APIs, and underlying hosting infrastructure from both external and credentialed perspectives.

Phishing & Social Engineering

Email phishing, vishing, smishing, and physical on-site social engineering — testing your human layer at every channel attackers exploit.

Additional Services

Extended security programs

For organizations building mature, continuous security programs, we offer expanded service packages tailored to your needs.

Vulnerability Assessments

Scheduled network and application vulnerability identification and risk-ranked reporting on quarterly, semi-annual, or annual cycles.

Compliance-Scoped Testing

Engagements scoped and documented for SOC 2, PCI DSS, HIPAA, FINRA, CMMC, GLBA, SOX, GDPR, CCPA, and more.

Recurring Testing Packages

Multi-engagement packages for organizations with multiple networks, applications, or business units requiring ongoing coverage.

Security Awareness Training

Post-test employee training sessions that use real results to drive behavioral change and security policy compliance.

Cybersecurity
Ready to Test Your Defenses?

The best defenses are well-tested
against a good offense.

Not sure where to start?

We'll scope it with you.

Many clients come to us knowing they need testing but unsure of scope. Tell us about your environment and we'll recommend the right assessment. No obligation, no pressure.

Network Penetration Testing

We attack your network the way a real adversary would — using live tools, manual techniques, and lateral movement — to find every gap before someone else does.

What is a network penetration test?

A network penetration test is a controlled, authorized attack on your network infrastructure. Our team of certified ethical hackers deploys the same tools and techniques used by malicious threat actors to identify vulnerabilities in your systems, escalate privileges, and determine how far a real attacker could penetrate your environment.

Unlike automated vulnerability scanners, our manual methodology allows us to chain vulnerabilities together, discover business logic flaws, and uncover attack paths that software simply cannot identify. The result is a true picture of your risk — not a list of theoretical issues from a tool.

Scope options

External Network Testing

Simulates an outside attacker targeting your internet-exposed infrastructure — web servers, VPNs, mail gateways, firewall rules, and more.

Internal Network Testing

Simulates a threat from inside your perimeter — an insider threat, compromised endpoint, or lateral movement post-breach scenario.

Wireless Network Testing

Tests the security of your wireless infrastructure, including segmentation, rogue AP detection, and encryption weaknesses.

Our testing methodology

  • Reconnaissance: Active and passive intelligence gathering on all in-scope targets.
  • Scanning & Enumeration: Mapping all reachable hosts, services, and potential entry points.
  • Vulnerability Mapping: Identifying exploitable weaknesses, misconfigurations, and unpatched systems.
  • Exploitation & Privilege Escalation: Attempting to exploit findings and escalate access across the network.
  • Lateral Movement: Determining how far a breach could extend from the initial point of compromise.
  • Documentation & Reporting: Detailed findings with severity ratings, evidence, and prioritized remediation steps.

What you receive

  • Executive Summary for C-suite and Board-level stakeholders
  • Detailed Technical Report for CISO, IT leadership, and compliance staff
  • Granular findings with evidence for security engineers and IT teams
  • Attestation and client-summary reports for auditors, insurers, and customers
  • Step-by-step prioritized remediation roadmap for every finding

Web Application Penetration Testing

Manual, OWASP-aligned assessment of your web application from every angle — external exposure, internal credentialed access, API security, and underlying infrastructure.

Why manual web app testing matters

Automated scanning tools are a starting point — not a security program. They miss business logic vulnerabilities, authentication flaws, complex injection paths, and the creative attack chains that real adversaries exploit. Our AppSec engineers conduct hands-on assessments that go beyond what any scanner can find.

Functionality and speed are almost always the primary concern in development, leaving security as an afterthought. That's not a criticism — it's reality. Our role is to bridge that gap safely and constructively, giving your development team a clear roadmap to a secure application.

Testing approach

  • OWASP-aligned methodology: Built around the Open Web Application Security Project testing guide — the definitive framework for web application assessments.
  • Unauthenticated (external) testing: Assessing your public-facing application as an outside attacker with no credentials.
  • Authenticated (credentialed) testing: Testing internal functionality, role-based access controls, and data exposure from within the application.
  • API penetration testing: Assessing REST, SOAP, and GraphQL API endpoints for authentication, authorization, and injection vulnerabilities.
  • Code & infrastructure review: Examining back-end architecture, hosting configuration, and code-level security patterns where in scope.

Delivered as a partner, not an auditor

We work with your development team, not against them. Our findings are delivered with context — why it matters, how it can be exploited, and precisely how to fix it. Just as a CFO relies on a CPA firm for an independent audit, an independent security review from Grid32 provides the insight and credibility your stakeholders trust.

Phishing & Social Engineering Assessments

Your firewalls are only as strong as your most susceptible employee. We test the human layer — across email, phone, text, and physical access — the way real attackers do.

The most exploited attack vector

The vast majority of successful breaches begin with a human. Phishing campaigns, social engineering calls, and physical access attempts routinely bypass technical controls and reach your most sensitive data and systems. An independent test of your human defenses is no longer optional — it's a fundamental component of any mature security program.

Email phishing assessments

We design and execute staged email phishing campaigns — beginning with broad, easily-detected attacks and progressively escalating to highly-targeted spear-phishing using mimicked domains and custom pretexts. This reveals not just whether your users will fall victim, but at what level of sophistication your defenses will fail.

Phone phishing (vishing)

Our engineers call your staff using a range of social engineering scenarios — posing as IT support, company leadership, or affiliated vendors. Both live calls and automated scenarios are used, as each produces different results. All calls are non-disruptive, typically under a minute.

SMS phishing (smishing)

Text-based phishing is a growing and highly-effective attack vector. Many users apply far less skepticism to text messages than to email, making smishing assessments a valuable addition to any social engineering engagement.

Physical on-site assessments

Our engineers visit your facility and attempt to gain physical access using social engineering — posing as couriers, contractors, or staff. If successful, we attempt to access network resources, plant authorized testing hardware, or gain access to workstations and server rooms.

Post-test: security awareness training

The results of a real social engineering assessment are the most powerful tool available for driving behavioral change. We offer follow-up security awareness training that uses your actual test results to contextualize risks — transforming failures into lasting improvements.

Our Story

The experience of an enterprise firm.
The attention of a boutique.

Grid32 was founded in New York City in 2009 by a team of senior information security engineers with backgrounds at the Department of Defense, Department of Energy, NASA, Cisco, and National Grid.

Who We Are

Specialists, not generalists

Penetration testing is all we do. That single-mindedness is not a constraint — it's our competitive advantage. While other firms stretch across dozens of service lines, our engineers spend every engagement doing one thing: finding the ways into your systems that you don't know exist.

Our founders came from some of the most demanding security environments in the world — government agencies, critical infrastructure operators, and leading technology firms. That background informs everything: our methodology, our reporting, our client relationships, and our standards for what constitutes a thorough engagement.

We only employ U.S.-based security engineers. All staff undergo full background checks. We do not offshore work, use subcontractors, or deploy junior analysts on client engagements. When Grid32 is on your network, it is a senior certified engineer — not a first-year employee with a scanner.

2009
Year Founded
15+
Years of Service
1,000+
Tests Completed
0
Service Disruptions
100%
U.S.-Based, Background-Checked Engineers
Certifications

The credentials that matter

Our engineers hold the most rigorous and respected certifications in offensive security and information assurance.

CISSP GPEN GXPN OSCP OSWP OSCE CCIE CDPSE eCPPT
Client Testimonials

Results our clients remember

We tried in-sourcing pentesting but eventually discovered that partnering with Grid32 was far easier than trying to hire, manage, and retain top cyber talent. Our product got better and our headaches went away.

Director of Sales — Regional MSP

Grid32 tests dozens of applications for us every year. They are our go-to partner for ensuring an application is ready to launch from a security standpoint and for continued assessments against new threats.

Director of InfoSec — Fortune 500 Conglomerate

We performed testing for compliance, but realized benefits far beyond satisfying our auditors. We now have independent proof for our customers that we operate a secure application.

CTO — Technology Company

Work with the team behind
elite security programs.

Whether you're building a security program from scratch or need a rigorous independent audit, Grid32 has the expertise and track record to deliver.

Partner Program

White-Label & Referral Opportunities

Offer enterprise-grade penetration testing to your clients under your own brand — or refer them directly. Zero hiring, zero overhead, and revenue that drops to your bottom line.

The Opportunity

The demand for pentesting is growing fast.
Capture it.

Government regulation, cyber insurance requirements, customer mandates, and simple prudence are driving organizations of all sizes to seek independent security assessments. Grid32 has performed thousands of these engagements — many of them through partner affiliates who earn recurring revenue with minimal effort.

White Label

Deliver it under your brand

Grid32's White Label program is a turnkey solution for firms that want to offer cybersecurity services without the hiring, infrastructure, or expertise overhead required to operate in this space.

We perform all testing and deliver all reports branded under your company name. Your clients receive exceptional pentesting. You maintain the client relationship and margin.

Ideal for Managed Service Providers (MSPs), IT consulting firms, and accounting or compliance practices.

Referral

Refer and earn

If you have clients who need cybersecurity services but prefer to refer them directly to Grid32, our Referral Program pays lucrative fees for every engagement completed.

No project management required on your end. No conflicts of interest. Just a clean, recurring revenue stream for introducing clients to a service they need.

Many of our partners use both programs — white-labeling some clients and referring others — depending on the relationship and project type.

Who This Is For

Built for firms who already have the trust

Managed Service Providers

Your clients trust you with their IT environment. Offering independent security validation deepens that relationship and opens new revenue streams.

Accounting & CPA Firms

Clients navigating SOC 2, GLBA, SOX, and other compliance frameworks need independent security testing. You can deliver it — or refer it.

IT Consultants & VARs

Complement your implementation and advisory work with ongoing security validation. Turn one-time projects into annual recurring relationships.

Forensic & Legal Firms

Extend your post-breach work into proactive prevention. Grid32 handles the offensive assessment; you maintain the client advisory role.

Partner Testimonials

Grid32's partner program was a no-brainer for us and our customers. It gave us a new revenue stream that drops right to the bottom line and ensures our customers see us as a source of cyber-expertise.

Partner — Mid-sized CPA Firm

We tried in-sourcing pentesting but discovered that partnering with Grid32 was far easier than trying to hire, manage, and retain top cyber talent. Our product got better and our headaches went away.

Director of Sales — Regional MSP

Ready to add pentesting
to your service offering?

Reach out and we'll walk you through both program options and find the right fit for your business and your clients.

Get In Touch

Talk to a cybersecurity expert

Have questions about scope, methodology, compliance requirements, or pricing? Reach out and one of our senior engineers will respond — not a salesperson.

Contact Information

We're here to help

Office
2029 Morris Avenue, Union, NJ 07083
Phone
(800) 936-3204

Prefer to build your own quote?

Our online quote builder lets you scope and price your engagement in minutes — no call required to get started.

We will never share your information or use it for unwanted solicitations.

Send us a message

We typically respond within one business day.

Online Quote Builder

Scope your engagement.
Get a price instantly.

Select the services you need and configure your scope. Your estimate updates in real time. Submit when ready and we'll have a Statement of Work to you within one business day.

Step 1 — Select services to include
External Network
Internal Network
Wireless Network
Web Application
Phishing & Social Engineering

Click one or more services above to configure your scope below.

External Network Penetration Test
How many internet-exposed hosts or resources does your external network have? (websites, servers, VPN gateways, firewalls, etc.)
Small
< 10 hosts
Medium
10 – 30 hosts
Large
31 – 75 hosts
Enterprise
75+ hosts
Internal Network Penetration Test
How many hosts does your internal network have? (computers, servers, devices)
Small
< 75 hosts
Medium
75 – 250 hosts
Large
251 – 1,000 hosts
Enterprise
1,000+ hosts
Wireless Network Penetration Test
How many unique wireless networks or SSIDs do you need tested?
Can all networks be tested from one location?
Yes
No — multiple locations
Wireless estimate

Wireless testing requires on-site access. Pricing includes per-network and per-location fees. A Grid32 engineer will confirm logistics before scheduling.

Web Application Penetration Test
How many estimated dynamic pages does your web application contain? (login pages, dashboards, forms, and data-driven pages — not static content pages)
Small
< 7 pages
Medium
7 – 12 pages
Large
13 – 20 pages
Enterprise
20+ pages
Does your application expose APIs in-scope for testing?
No
Yes
Phishing & Social Engineering Assessment
Select the social engineering methods to include:
Email Phishing
Phone / Vishing
SMS / Smishing
Knowledge Center

Cybersecurity Knowledge Hub

Expert guidance on penetration testing, vulnerability management, compliance, and building a mature security program — written by the Grid32 team.

Topics

Browse by subject area

Network Penetration Testing

Everything you need to know about external, internal, and wireless network pentesting — what it is, how it works, and what to expect.

22 Articles

Web Application Penetration Testing

Deep-dive guides on web app security, OWASP methodology, API testing, and protecting your applications from real-world threats.

15 Articles

Phishing & Social Engineering

How social engineering attacks work, what we test for, and why the human layer is the most commonly exploited attack vector.

8 Articles

Security Awareness Training

Why employee security training matters and how to use real test results to drive lasting behavioral change across your organization.

3 Articles

Cybersecurity Best Practices

Practical guidance on passwords, access controls, incident preparation, and hardening your Microsoft 365 and Active Directory environments.

5 Articles

Have a question not covered here?

Our team is happy to answer questions about scope, methodology, or what testing is right for your organization. No obligation.

KnowledgeNetwork Penetration Testing

Network Penetration Testing: The Complete Guide

Everything organizations need to know about network pentesting — what it is, how it works, what to expect, and how to choose the right scope.

Network penetration testing is one of the most effective tools available for proactively identifying security vulnerabilities before attackers can exploit them. This guide covers every aspect of network pentesting — from foundational concepts to practical guidance for organizations preparing for their first — or their fifteenth — engagement.

What Is a Network Penetration Test?

A network penetration test is a controlled, authorized simulation of a cyberattack against your network infrastructure. Certified security engineers use the same tools, techniques, and methodologies that real-world attackers use to probe your defenses, identify weaknesses, and determine how far a malicious actor could penetrate your environment. Unlike passive reviews or compliance checklists, a penetration test is active and adversarial — producing evidence-based findings because our team actually attempts to exploit the vulnerabilities we discover.

Pentest vs. Vulnerability Assessment

These terms are often confused. A vulnerability assessment identifies and catalogs potential weaknesses. A penetration test goes further — it attempts to exploit those weaknesses to determine whether they represent genuine, actionable risk. Both are valuable; the right choice depends on your maturity, budget, and compliance requirements.

Types of Network Penetration Tests

Understanding the different areas of testing helps you choose the right engagement for your organization.

  • External penetration testing — Simulates an internet attacker targeting your perimeter. Learn more →
  • Internal penetration testing — Simulates a threat already inside your perimeter. Learn more →
  • Wireless penetration testing — Assesses Wi-Fi security, segmentation, and authentication controls. Learn more →

How the Testing Process Works

Every Grid32 engagement follows a structured testing methodology built around four phases: reconnaissance, scanning and enumeration, exploitation and privilege escalation, and reporting — ensuring consistency, thoroughness, and the operational safety of your environment.

Is Penetration Testing Safe?

When performed by experienced professionals using manual techniques, yes. Grid32 has conducted over a thousand engagements without a single unintended service disruption. Learn more about safety →

What Does the Report Look Like?

Every engagement concludes with a tiered final report including an executive summary, detailed technical findings, and attestation documentation for auditors and customers.

How Often Should You Test?

Most organizations with mature security programs test annually at minimum. See our frequency recommendations →

Ready to test your network?

Use our online quote builder to scope and price your engagement in minutes. We respond with a Statement of Work within one business day.

KnowledgeWeb Application Penetration Testing

Web Application Penetration Testing: The Complete Guide

A comprehensive resource on web app security testing — from OWASP methodology and API testing to what distinguishes a real pentest from an automated scan.

Web applications are among the most targeted assets in any organization. They are internet-facing, complex, and built under constant time pressure — leaving security as an afterthought. Web application penetration testing closes that gap by revealing exactly what an attacker could do to your application before they get the chance to try.

What Is Web Application Penetration Testing?

A web application penetration test is a manual security assessment of your web application, APIs, and underlying architecture. Our engineers attempt to exploit vulnerabilities from the outside — as an unauthenticated attacker — and from within, simulating a credentialed user attempting to escalate access or exfiltrate data.

Why Manual Testing Beats Automated Scanning

Automated scanners miss the vulnerabilities that matter most: business logic flaws, authentication bypasses, complex injection chains, and access control failures that only reveal themselves through human reasoning. Grid32's approach is manual-first — we use tools to assist, not replace, expert judgment.

Areas of Web Application Testing

A thorough web app engagement covers multiple perspectives: unauthenticated external testing, authenticated credentialed testing, and API security testing. Each reveals a distinct category of vulnerabilities.

OWASP and Our Testing Methodology

Grid32's methodology is built around the OWASP Testing Guide — the definitive framework for web application security assessments. This ensures systematic coverage of all major vulnerability classes while leaving room for application-specific attack scenarios.

Working With Your Development Team

We work with your development team, not against them. Our findings include root cause, business impact, and specific remediation guidance so developers can fix issues efficiently without guesswork.

Protect your web application.

Grid32's AppSec engineers have assessed applications of every type and scale. Get a quote in minutes.

KnowledgePhishing & Social Engineering

Phishing & Social Engineering Testing: The Complete Guide

How social engineering assessments work, what they test, and why the human layer remains the most exploited — and most underprotected — element of any security program.

Technical controls protect systems. Social engineering bypasses them entirely by targeting people. A surprising number of breaches begin not with a sophisticated exploit, but with a single user who clicked a link, read a caller ID, or held a door open. Testing your human layer is not optional — it is essential.

What Is Social Engineering Testing?

Social engineering testing simulates the human-manipulation tactics used by real attackers — including phishing emails, fraudulent phone calls, text message attacks, and in-person physical access attempts — to assess how your staff and detection systems respond. These can be standalone or combined with a network penetration test.

Types of Social Engineering Assessments

  • Email phishing — Staged campaigns from broad spam to targeted spear-phishing. Learn more →
  • Phone phishing (vishing) — Live and automated calls impersonating IT, leadership, or vendors. Learn more →
  • SMS phishing (smishing) — Text-based attacks that exploit lower user skepticism. Learn more →
  • Physical on-site testing — Attempting facility access through deception. Learn more →

What the Report Covers

Every engagement concludes with a comprehensive social engineering report including campaign statistics, individual-level results where authorized, and prioritized remediation recommendations.

Following Up With Security Awareness Training

Real test results are the most powerful input for security awareness training. Employees who fell for a simulated attack are far more receptive to learning why — and what to do differently.

Test your human layer.

Social engineering is the attack vector most likely to succeed in your organization right now.

KnowledgeSecurity Awareness Training

Security Awareness Training

Why employee training is a critical layer of your security program and how to use real test data to maximize its impact.

Technical security controls can detect and block many threats — but they cannot fully compensate for a user who has been deceived. Security awareness training equips your staff with the knowledge and habits to recognize threats, respond correctly, and become a genuine line of defense.

Why Security Awareness Training Matters

Human error is a contributing factor in the overwhelming majority of data breaches. The regulatory landscape increasingly demands it too — SOC 2, HIPAA, PCI DSS, CMMC, and many cyber insurance policies require documented security awareness training programs.

Training Tied to Real Results

Generic training has a well-documented problem: employees don't pay attention. Grid32's training is designed to follow a phishing or social engineering assessment. Using the actual results of a real attack against your organization makes the training concrete, personal, and impossible to dismiss.

What Effective Training Covers

  • Recognizing phishing emails, spear-phishing, and business email compromise
  • Phone-based social engineering and vishing tactics
  • Physical security — tailgating, piggybacking, and secure facility practices
  • Password hygiene and multi-factor authentication
  • Safe handling of sensitive data and proper incident reporting procedures
  • Regulatory obligations relevant to your industry

On-Site Training Tailored to Your Organization

Grid32 provides on-site training sessions tailored to your organization's results, size, and industry. We work with your HR, compliance, and IT teams to ensure the program aligns with your existing security policies and meets documentation requirements from auditors or insurers.

Interested in security awareness training?

Contact us to discuss how training can be structured for your organization — as a standalone service or as a follow-up to a social engineering assessment.

KnowledgeCybersecurity Best Practices

Cybersecurity Best Practices

Practical, expert-written guidance on hardening your environment, strengthening access controls, and preparing for security incidents.

Strong penetration testing results are only meaningful if findings get remediated and the underlying environment is maintained at a high baseline of security hygiene. This section covers the practical measures every organization should have in place — independent of whether you've had a pentest.

Password Security and Access Controls

Weak and reused passwords remain one of the most exploited entry points in network penetration tests. Implementing strong password policies, blacklisting predictable terms in both Active Directory and Microsoft 365, and enforcing multi-factor authentication across all remote access are the highest-ROI security investments most organizations can make.

Microsoft 365 Security

M365 default configurations are not hardened — they prioritize usability. Our M365 security recommendations cover critical settings, policies, and monitoring configurations every M365 organization should review.

Preparing for Security Incidents

Most organizations that suffer a significant breach discover — too late — that they had no documented incident response plan. Preparing before an incident occurs is dramatically more effective than improvising during one.

Ready to assess your current security posture?

A Grid32 penetration test will show you exactly where your defenses stand up — and where they need work.

KnowledgeNetwork PentestingWhat Is a Penetration Test?

What Is a Penetration Test?

A plain-language explanation of what a penetration test is, how it differs from other security assessments, and why organizations rely on it to validate their defenses.

The Core Definition

A penetration test — often called a pentest or ethical hack — is a controlled, authorized simulation of a cyberattack. A team of certified security engineers uses the same tools, techniques, and tactics that real-world attackers use to probe your network, applications, or personnel for exploitable weaknesses. The goal is simple: find the vulnerabilities before an attacker does, understand how they could be exploited, and provide a clear roadmap for fixing them.

What Makes It Different From a Security Audit?

A security audit reviews policies, procedures, and configurations against a standard or framework. A penetration test is active — engineers actually attempt to exploit discovered weaknesses. Auditing your locks is different from hiring a locksmith to try to pick them. Both have value, but only one tells you whether your locks actually hold.

What Does a Pentest Actually Involve?

A professional penetration test follows a structured testing methodology. At Grid32, that process includes: Reconnaissance, Scanning and Enumeration, Vulnerability Mapping, Exploitation and Privilege Escalation, and Reporting with a full remediation roadmap.

Types of Penetration Tests

How Is a Pentest Different From a Vulnerability Assessment?

A vulnerability assessment scans your environment and produces a list of potential issues. A penetration test goes further — it attempts to exploit those issues to determine whether they represent genuine, actionable risk.

Ready to find out what an attacker would find?

Grid32's certified engineers use the same techniques real attackers use — and deliver findings you can act on.

KnowledgeNetwork PentestingPentest vs. Vulnerability Assessment

Penetration Test vs. Vulnerability Assessment: What's the Difference?

Two commonly confused security services explained — what each does, when to use each, and which is right for your organization.

The Quick Answer

A vulnerability assessment identifies potential security weaknesses and catalogues them. A penetration test attempts to exploit those weaknesses to prove they represent genuine risk. Both are valuable — but they answer different questions.

What Is a Vulnerability Assessment?

A VA uses automated scanning tools and manual review to identify known vulnerabilities across your environment — unpatched software, misconfigured services, weak cipher suites, and similar issues. VAs are typically faster and less expensive than penetration tests. They work best as a regular hygiene exercise — run quarterly or monthly to catch newly-disclosed vulnerabilities and configuration drift.

What Is a Penetration Test?

A penetration test takes VA output and goes further. Our engineers actively attempt to exploit discovered vulnerabilities, chain multiple weaknesses together, escalate privileges, and move laterally through the environment — exactly as a real attacker would. The result is a demonstrated narrative of what an attacker could actually accomplish.

Key Differences

  • Depth — A VA identifies issues; a pentest proves they're exploitable
  • Methodology — VAs rely heavily on automated tools; pentests are primarily manual
  • Output — VA produces an issue list; pentest produces an attack narrative with evidence
  • Compliance value — Many frameworks (PCI DSS, SOC 2, CMMC) specifically require penetration testing

Which Should You Choose?

For organizations at an early stage of security maturity, a vulnerability assessment is a good first step. For organizations past the basics, or that face compliance requirements, a penetration test provides the depth a VA cannot. Many organizations run both: regular VAs as an ongoing hygiene measure, with penetration tests annually for deeper validation.

Not sure which you need?

We're happy to review your environment and recommend the right assessment — no obligation.

KnowledgeNetwork PentestingHow Long Does a Test Take?

How Long Does a Penetration Test Take?

Testing timelines vary by scope and complexity. Here's what to expect at each stage — from kickoff to final report delivery.

The Short Answer

Most penetration test engagements — from initial scoping to final report delivery — take between two and four weeks. The active testing phase itself typically runs one to two weeks, depending on scope.

Factors That Affect Timeline

  • Scope size — Number of IP addresses, hosts, or applications in scope is the primary driver
  • Test type — External tests are often faster than internal tests
  • Environment complexity — Complex segmentation or large application codebases require more time
  • Combined engagements — Combined network and web app or social engineering testing extends the timeline

Typical Timeline Breakdown

  1. Scoping and SOW (1–3 days) — After you submit your quote, Grid32 reviews and issues a Statement of Work
  2. Pre-test coordination (2–5 days) — Confirming scope, authorizations, and technical prerequisites
  3. Active testing (5–10 business days) — Our engineers conduct the engagement
  4. Report writing and QA (3–5 business days) — All findings documented, severity-rated, and reviewed
  5. Report delivery and debrief — Full report package delivered with walkthrough available

Rush Engagements

If you have a compliance deadline or other time-sensitive requirement, contact us to discuss expedited scheduling.

Ready to get started?

Use our online quote builder to scope your engagement. We typically have a Statement of Work back to you within one business day.

KnowledgeNetwork PentestingHow Much Does a Test Cost?

How Much Does a Penetration Test Cost?

Penetration test pricing varies widely. Here's what drives cost, what to watch out for, and how to get a transparent number from Grid32.

Why Pricing Varies So Much

Penetration testing pricing varies enormously across the industry — from a few thousand dollars to well over $100,000 — because "penetration test" covers a wide range of scope, methodology, and quality. A report produced by automated scanning tools is fundamentally different from one produced by a senior certified engineer conducting manual testing. Both may be sold as "penetration tests."

What Drives the Cost?

  • Scope size — Number of external IPs, internal hosts, or web applications in scope
  • Test type — Internal tests typically cost more than external; combined engagements more than single-scope
  • Methodology — Manual testing by senior engineers costs more than automated scanning — and is substantially more valuable
  • Report depth — Tiered reporting with executive summaries and attestation documentation takes more time to produce

Grid32 Pricing

Grid32 offers transparent, scope-based pricing through our online quote builder. You define your scope; we provide a clear price. No discovery calls required. No surprise line items after the SOW.

You Get What You Pay For

The cheapest penetration test is often not a penetration test at all — it's an automated vulnerability scan with a branded PDF wrapper. See our full discussion on pentest pricing →

Get a transparent price in minutes.

Our quote builder lets you define your scope and see your price — no sales call required.

KnowledgeNetwork PentestingAreas of Network Testing

Network Penetration Testing Scope: External, Internal & Wireless

The different areas of network penetration testing explained — what each scope covers and how to choose the right combination.

Why Scope Matters

Network penetration testing isn't one-size-fits-all. A well-scoped engagement targets the areas of your environment that are most exposed, most critical, or most relevant to your compliance requirements.

External Network Penetration Testing

External pentesting simulates an attacker on the internet targeting your perimeter — public IP addresses, web servers, VPN concentrators, mail gateways, DNS infrastructure, and firewall rules. External testing is the recommended starting point for organizations new to pentesting, addressing the most immediately exposed attack surface. Learn more →

Internal Network Penetration Testing

Internal pentesting simulates a threat that has already bypassed the perimeter — an insider, compromised remote worker, or attacker who gained initial access via phishing. Internal tests frequently uncover the most severe findings, because internal networks are often significantly less hardened than external-facing systems. Learn more →

Wireless Network Penetration Testing

Wireless testing assesses encryption standards, network segmentation, rogue access point detection, and authentication controls. Many organizations are surprised to find that their wireless network provides an easy path into their internal environment. Learn more →

Combining Scopes

A combined external and internal engagement reflects the reality of how most breaches unfold: an initial perimeter breach followed by lateral movement. Grid32 offers flexible scoping — build your custom quote online or contact us to discuss what combination makes sense.

Not sure what scope is right for you?

Our team is happy to review your environment and recommend a testing scope that fits your risk profile and budget.

KnowledgeNetwork PentestingExternal Penetration Testing

External Network Penetration Testing

What external penetration testing covers and why every organization with an internet presence should regularly test their external attack surface.

What Is External Penetration Testing?

External penetration testing simulates the perspective of an attacker on the open internet — someone with no prior access who is probing your external attack surface for a way in. Our engineers conduct this test entirely from outside your network, targeting every internet-exposed asset associated with your organization.

What External Testing Covers

  • All public IP addresses and associated services
  • Web servers, web applications, and public portals
  • VPN and remote access infrastructure
  • Email and mail transfer infrastructure
  • DNS configuration and zone security
  • Firewall and edge device exposure
  • SSL/TLS configuration and certificate validity
  • OSINT — what publicly available information could assist an attacker?

Why External Testing Is a Critical Starting Point

Your external attack surface is the front door that every attacker on the internet can knock on. Most organizations that have never had a formal external test have at least one significant finding — often more.

How Often Should You Test Externally?

We recommend annual external testing at minimum, with additional testing after significant infrastructure changes — new services launched, acquisitions, cloud migrations, or changes in your IP space. Many compliance frameworks require annual external testing explicitly.

Find out what attackers see when they look at your organization.

An external penetration test gives you a clear, evidence-based picture of your internet-facing exposure.

KnowledgeNetwork PentestingInternal Penetration Testing

Internal Network Penetration Testing

What internal penetration testing simulates and why most organizations find their most severe vulnerabilities inside the perimeter, not outside it.

What Is Internal Penetration Testing?

Internal penetration testing simulates a threat actor who has already gained access to your internal network — whether through a phishing attack, stolen credentials, a compromised remote connection, or a malicious insider. Our engineers connect directly to your internal environment and attempt to enumerate systems, exploit weaknesses, escalate privileges, and access sensitive data.

Why Internal Testing Reveals the Most Severe Findings

Many organizations invest heavily in perimeter security but leave their internal networks comparatively flat and unprotected. Once inside, an attacker often finds few barriers between a standard workstation and highly sensitive assets like domain controllers, file servers, databases, and financial systems. Internal tests regularly uncover misconfigurations, unpatched systems, overly permissive access controls, and lateral movement paths that would allow an attacker to compromise an entire domain from a single initial foothold.

What Internal Testing Covers

  • Active Directory enumeration and privilege escalation
  • Lateral movement and credential harvesting
  • Internal network segmentation assessment
  • Unpatched or misconfigured internal services
  • Access to sensitive data, shares, and databases
  • Detection and response testing — how long before your team notices?

Your perimeter is only as strong as what's behind it.

Find out what an attacker could do once inside your network before they get the chance.

KnowledgeNetwork PentestingWireless Penetration Testing

Wireless Network Penetration Testing

Why wireless network security is often overlooked, what wireless penetration testing assesses, and what common findings look like.

Why Wireless Security Deserves Its Own Assessment

Wireless networks introduce a unique threat model: an attacker doesn't need to be inside your building to attack. Anyone within radio range — in your parking lot, your lobby, or the building next door — can attempt to access your wireless network. Yet wireless is frequently the least-scrutinized part of most organizations' network security.

What Wireless Penetration Testing Covers

  • Encryption and authentication — Are you using WPA2 or WPA3 Enterprise? Any legacy WEP or WPA Personal devices?
  • Network segmentation — Is your guest network truly isolated from your corporate network?
  • Rogue access point detection — Are there unauthorized access points connecting to your network?
  • Evil twin attacks — Can an attacker create a spoofed network that devices connect to automatically?
  • Credential attacks — Can wireless authentication credentials be captured and cracked?

Combining Wireless With Network Testing

Wireless testing is most valuable when combined with an internal network penetration test. Once an attacker gains wireless access, the next step is lateral movement — testing both together provides a complete picture of the risk.

Is your wireless network a gap in your defenses?

Grid32's wireless penetration testing gives you a definitive answer — and the roadmap to fix any issues found.

KnowledgeNetwork PentestingHow the Testing Process Works

How the Penetration Testing Process Works

A step-by-step walkthrough of the Grid32 engagement process — from quote to final report delivery.

Phase 1: Scoping and Quoting

Every engagement begins with scoping — defining exactly what systems, applications, and users are in scope. Grid32 offers an online quote builder that lets you define your scope and receive a price without a sales call. We review and issue a Statement of Work typically within one business day.

Phase 2: Pre-Test Coordination

After the SOW is executed, we schedule the engagement and exchange technical prerequisites. For internal tests: VPN or on-site access. For web app tests: test account credentials. We confirm rules of engagement — what's in scope, emergency contacts, and any systems requiring special handling.

Phase 3: Reconnaissance

Our engineers gather information about the target using both passive techniques (OSINT, DNS, certificate transparency logs) and active techniques (network scanning, service enumeration). The goal: develop a comprehensive map of the attack surface before exploitation begins.

Phase 4: Scanning and Enumeration

We systematically probe all in-scope systems to identify running services, versions, and configurations — producing a detailed inventory and initial identification of exploitable weaknesses.

Phase 5: Exploitation and Privilege Escalation

Our engineers attempt to exploit discovered vulnerabilities, chain issues together, escalate privileges, and move laterally through the environment. Every successful exploitation is documented with evidence. We never cause damage or data loss — the goal is proof of impact.

Phase 6: Reporting

All findings are compiled into a comprehensive report — every vulnerability ranked by severity with evidence, business impact assessment, and specific remediation guidance. Reports are reviewed internally before delivery.

Phase 7: Debrief and Remediation Support

We walk through findings with your team, answer questions, and help prioritize your response. Many clients return for a follow-up assessment after remediation to verify that issues have been resolved.

The process is straightforward. The results are actionable.

Start your engagement with an online quote — no sales calls, no pressure.

KnowledgeNetwork PentestingWhat Does the Report Include?

What Does a Penetration Test Report Include?

Grid32 delivers tiered, multi-audience reports — from board-level executive summaries to granular technical findings. Here's what to expect.

Why Report Quality Matters

A penetration test is only as valuable as the report that comes out of it. A list of CVE numbers and CVSS scores is not a roadmap for improvement — it's noise. Grid32's reports are designed to be genuinely useful to every audience that needs to act on them.

Executive Summary

Written for C-suite leaders and board members who need to understand business implications without technical detail. It includes an overall risk assessment, the most significant findings in plain language, and a high-level remediation priority summary. Many clients use this section directly in board presentations or risk committee reports.

Detailed Technical Report

Designed for CISOs, IT directors, compliance officers, and security leadership. It provides a full inventory of all findings, organized by severity, with: detailed vulnerability descriptions, step-by-step evidence of exploitation, severity ratings and CVSS scores, business impact assessment, specific actionable remediation guidance, and prioritization recommendations.

Attestation and Client-Facing Reports

For organizations that need to demonstrate their security posture to customers, auditors, or regulators, Grid32 provides attestation reports and client-summary documents. Learn more about attestation reports →

Remediation Verification

After you've addressed findings, we offer follow-up verification testing to confirm that vulnerabilities have been remediated effectively — particularly valuable before audit cycles.

Reports your board can present. Reports your engineers can act on.

Grid32's tiered reporting ensures every stakeholder gets the information they need in the format they need it.

KnowledgeNetwork PentestingIs Pentesting Safe?

Is Penetration Testing Safe? Will It Cause Downtime?

The most common concern about pentesting addressed directly — what the risks are, how they're managed, and Grid32's zero-disruption track record.

The Short Answer

Yes — when performed by experienced professionals using manual methodologies, penetration testing is safe. Grid32 has conducted over a thousand engagements across networks, web applications, and social engineering scenarios without a single unintended service disruption. Our safety record is not an accident — it's the result of deliberate methodology.

Why Automated Tools Create Risk

The primary risk in penetration testing comes from automated scanning tools that send high volumes of requests to services that may not handle them gracefully. Grid32's methodology is manual-first. Our engineers understand the potential impact of each technique before applying it, and avoid anything that could cause service disruption in a production environment.

Testing Windows and Scheduling

For organizations with business continuity concerns, we can schedule intensive testing phases during off-hours, weekends, or maintenance windows. We work around your operational requirements.

Emergency Stop Protocols

Every engagement includes a designated point of contact at your organization who can halt testing immediately if needed. Established before testing begins as part of our standard rules of engagement.

What We Never Do

  • Delete, modify, or exfiltrate production data
  • Deploy persistent malware on in-scope systems
  • Use exploits known to cause system crashes in production environments
  • Continue testing if unexpected system instability is observed

Test your defenses without disrupting your business.

Grid32's manual methodology ensures thorough testing with zero operational risk.

KnowledgeNetwork PentestingShould I Notify IT and Employees?

Should I Notify IT Staff and Employees Before Testing?

A nuanced question with legitimate considerations on both sides — and guidance on how to decide what's right for your engagement.

It Depends on What You're Trying to Measure

Whether to notify your IT team and employees before a penetration test depends on your objectives. There are good reasons to go either way, and the right answer often involves partial disclosure — telling some people but not others.

The Case for Notifying IT Staff

Notifying your IT team allows them to: be prepared to assist if needed, avoid unnecessarily responding to testing activity as a real incident, and handle automated blocking systems (IPS, EDR, SIEM alerts) appropriately. Most network penetration tests involve notifying at least a small group of IT leadership who serve as points of contact.

The Case for Blind Testing

If one of your objectives is to test your incident detection and response capabilities — how quickly your team notices an attacker, and how effectively they respond — then notifying IT defeats the purpose. Blind or "red team" engagements specifically withhold information from IT staff to assess real detection capability.

Social Engineering: The Notification Decision Matters Most

For social engineering assessments, the decision is particularly consequential. Notifying employees before a phishing campaign eliminates its value entirely. Most clients choose not to notify staff prior to social engineering testing — but do notify HR and select leadership so they can manage any employee concerns that arise.

Our Recommendation

For most network penetration tests: notify a small group of IT leadership but not the broader team. For social engineering: don't notify staff, but notify HR and select leadership. We'll discuss the right approach for your specific engagement before testing begins.

Not sure how to set up your engagement?

We're happy to walk through the options and help you design the most valuable test for your organization.

KnowledgeNetwork PentestingWe Work With IT, Not Against Them

Grid32 Works With Your IT Team — Not Against Them

Why penetration testing is not a reflection on IT performance, and how we work collaboratively to deliver value for everyone involved.

A Common Misconception

Some IT leaders are apprehensive about penetration testing because they worry about what it might imply about their team's performance. The honest answer: almost every penetration test finds significant issues, in almost every organization, regardless of how capable the IT team is. This is not a reflection on the team — it's a reflection on the inherent complexity of securing modern IT environments under real operational constraints.

Security vs. Functionality: An Inherent Tension

IT teams are under constant pressure to make systems accessible, easy to use, and functional. Those objectives are often in direct tension with security hardening. An independent security assessment isn't a verdict on IT — it's a tool that gives IT the specific, evidence-based findings they need to make the case for remediation investment and get proper attention from leadership.

The CFO / CPA Analogy

Just as a CFO relies on an independent CPA firm to audit financials — not because the CFO is doing anything wrong, but because independence adds credibility — IT and security leaders benefit from an independent penetration test that validates their environment and surfaces issues with an outside perspective that internal teams cannot replicate.

How We Work With Your Team

Throughout every engagement, we maintain open communication with your designated contacts. Our reports include specific, actionable remediation guidance written for technical teams — not vague recommendations that leave engineers guessing.

A pentest is an investment in your team, not an audit of them.

Give your IT team the independent validation and roadmap they need.

KnowledgeNetwork PentestingHow Often Should You Test?

How Often Should Your Organization Conduct Penetration Testing?

Testing frequency recommendations based on industry, risk profile, compliance requirements, and the pace of change in your environment.

The Baseline: Annual Testing

For most organizations, annual penetration testing is the recommended minimum. A year is long enough for meaningful changes to accumulate — new services, configuration drift, new attack techniques, newly-disclosed vulnerabilities — that a fresh test will find new issues even if last year's findings have been fully remediated.

When to Test More Frequently

  • Compliance requirements — PCI DSS requires annual external testing and testing after significant changes. CMMC and financial regulations may require similar frequency.
  • High-risk industries — Financial services, healthcare, legal, and government contractors often justify semi-annual or quarterly testing cycles.
  • Rapid environment change — If your infrastructure or application stack changes significantly, test again after those changes — don't wait for the annual cycle.
  • Following a security incident — After a breach or near-miss, testing should occur as part of the remediation and validation process.
  • Mergers and acquisitions — Before integrating an acquired organization's network, test it independently.
  • Cyber insurance requirements — Some insurers now require periodic penetration testing as a policy condition.

Building a Testing Program

The most mature security programs treat penetration testing as an ongoing program rather than a one-time event. Grid32 offers multi-engagement and recurring testing packages for organizations building structured programs. Contact us to discuss program options →

Build a testing program that keeps pace with your risks.

Grid32 works with organizations of all sizes to establish the right testing cadence.

KnowledgeNetwork PentestingHow Grid32 Protects Your Data

How Grid32 Protects Your Data During a Penetration Test

What data we access, how it's handled, and the security measures that protect your organization's information throughout every engagement.

What Data Grid32 Accesses

During a penetration test, our engineers may access data as a natural consequence of testing — for example, demonstrating that a vulnerability allows access to a database or file share. We document findings as proof of exploitability but do not copy, retain, or transmit client data beyond what is necessary to demonstrate the finding.

Confidentiality and Data Handling

All Grid32 engagements are subject to mutual non-disclosure agreements. Testing notes, screenshots, and evidence are retained only for the duration of the engagement and report production, then securely destroyed. Deliverables are transmitted via encrypted channels.

Background-Checked, U.S.-Based Staff Only

Every Grid32 engineer undergoes a thorough background check before joining our team. All staff are U.S.-based direct employees — no offshore contractors, subcontractors, or third parties. Your data never leaves a controlled environment staffed by vetted professionals.

We Never Share Your Information

Grid32 does not share, sell, or disclose any client information — including the fact that you're a client — to any third party. Contact information is never used for marketing or solicitations.

Questions about how your data is handled?

We're happy to discuss our data handling practices, NDA terms, and security measures before you engage.

KnowledgeNetwork PentestingWhy Choose Grid32?

Why Choose Grid32 for Penetration Testing?

What sets Grid32 apart from the dozens of firms offering penetration testing services — and why the difference matters for your organization.

Specialists, Not Generalists

Many cybersecurity firms offer penetration testing as one service among dozens. For these firms, pentesting is a line item. For Grid32, it's everything. Our entire team, methodology, and culture is built around one discipline: finding the vulnerabilities in your environment that an attacker would exploit.

Fifteen-Plus Years of Focused Experience

Grid32 was founded in New York City in 2009. We've conducted over a thousand engagements across financial services, healthcare, legal, technology, government contracting, and many other sectors. That depth of experience means our engineers have seen — and exploited — virtually every attack pattern in production environments.

Manual-First Methodology

We use tools to assist our engineers — not to replace them. This means we find vulnerabilities that scanners miss, and we understand the full business impact of every finding we deliver.

Elite, Certified, U.S.-Based Team

Our engineers hold CISSP, GPEN, GXPN, OSCP, OSCE, CDPSE, CCIE, and other advanced certifications. All are U.S.-based direct employees — no offshore contractors, no subcontractors. Every engineer has been background-checked and is a full-time Grid32 team member.

Zero Service Disruptions

One thousand-plus engagements. Zero unintended service disruptions. That record is a direct result of our manual methodology and our engineers' discipline in understanding the potential impact of every technique before applying it.

Experience the difference that specialization makes.

Build your quote online and see why leading organizations rely on Grid32.

KnowledgeNetwork PentestingU.S.-Based Engineers Only

Grid32 Employs U.S.-Based Engineers Only — No Outsourcing, No Offshore

Why it matters that the people conducting your penetration test are vetted, U.S.-based professionals.

A Policy We Never Compromise On

Every Grid32 engineer is a U.S.-based direct employee. We do not use offshore contractors, subcontractors, staffing agencies, or any third-party delivery model. Every person who accesses your network, tests your applications, or contacts your staff during a social engineering engagement is a full-time Grid32 team member who has passed a comprehensive background check.

Why This Matters for Security

Penetration testing requires privileged access to your most sensitive systems. During an internal network test, our engineers have domain-level access equivalent to a privileged insider. The integrity of everyone who touches your engagement is not a secondary concern — it is the foundation of the entire trust relationship.

Compliance Implications

For organizations subject to ITAR, CMMC, FedRAMP, or other government contracting requirements, the use of offshore personnel in security testing may create compliance violations. For financial institutions, healthcare organizations, and legal firms handling highly confidential data, the chain of custody over that data during a test matters.

Background Checks and Vetting

Every Grid32 engineer undergoes a thorough background check as a condition of employment. Many of our engineers come from backgrounds in government, defense, and critical infrastructure where security clearances are standard.

Know exactly who's on your network.

Grid32's team is vetted, certified, and U.S.-based — every time, without exception.

KnowledgeNetwork PentestingWho Fixes the Issues Found?

Who Fixes the Issues Found in a Penetration Test?

Clarifying the division of responsibility between your penetration testing firm and your internal team.

Grid32 Finds the Issues — Your Team Fixes Them

Grid32's role is to identify vulnerabilities, demonstrate their exploitability, explain their business impact, and provide specific guidance on how to remediate them. Implementing those fixes is the responsibility of your IT and development teams — or your managed service provider if you use one.

How Our Reports Make Remediation Easier

Grid32's remediation guidance is written to be actionable, not abstract. For each finding, we provide: the specific vulnerability and its root cause, recommended remediation steps with specific configuration changes or patch versions where applicable, priority level so your team knows what to fix first, and references to vendor advisories and industry standards.

Post-Remediation Verification

Many clients engage Grid32 for a follow-up verification assessment after remediation is complete — particularly before an audit cycle, a compliance deadline, or before sharing an attestation report with customers. This confirms that findings have been properly addressed and provides documented evidence of remediation.

What If We Don't Have the Internal Resources?

If your organization lacks the internal technical resources to remediate findings, we can recommend trusted managed service providers or refer you to specialists in specific areas. We're invested in your security outcomes beyond the delivery of the report.

Clear findings. Actionable guidance. Measurable improvement.

Grid32's reports are built to drive real remediation — not to sit in a folder.

KnowledgeNetwork PentestingTesting Outside the U.S.

Can Grid32 Test Infrastructure Outside the United States?

Guidance for organizations with international infrastructure who need penetration testing across multiple geographies.

The Short Answer: Yes, With Proper Coordination

Grid32 can test infrastructure hosted or located outside the United States. External penetration testing of internet-facing assets is inherently geography-agnostic — we test your IP addresses and domains regardless of where the underlying servers are physically located.

Considerations for International Testing

  • Legal authorization — You must have full legal authority to authorize testing of all in-scope systems. Written authorization from appropriate parties is required before testing begins.
  • Data residency and privacy laws — GDPR and other jurisdictions have specific requirements that may be relevant to how testing evidence is handled.
  • Network accessibility — Internal testing of geographically distributed networks may require coordination around VPN access or remote connectivity.
  • On-site testing — Physical social engineering assessments at international locations require separate coordination and are scoped separately.

If you have international infrastructure to include in your engagement scope, contact us before building your quote. We'll work through the requirements together.

International infrastructure? We can help.

Contact our team to discuss your international testing needs and how to scope them correctly.

KnowledgeNetwork PentestingWhy Is Your Price High or Low?

Why Is This Penetration Test Price So High — or So Low?

Understanding the relationship between price and quality in penetration testing, and what to look for when evaluating proposals.

Penetration Testing Price Ranges Vary Enormously

It's not uncommon for organizations to receive proposals ranging from $2,000 to $50,000+ for what appears to be the same service. Understanding what drives that variance is essential to evaluating proposals intelligently.

Why Some Pentests Are Very Inexpensive

  • Automated scanning, not manual testing — Automated tools can run against your environment in hours. The report is generated by software, not written by an engineer. This is a vulnerability scan with a branded PDF wrapper — not a penetration test.
  • Offshore delivery — Significantly less expensive, but introduces supply chain risk, accountability gaps, and potential compliance issues.
  • Junior or uncertified staff — Experienced, certified penetration testers are expensive to employ. Some firms substitute junior analysts with limited offensive security experience.
  • Shallow scope — A low price may reflect a very narrow scope that misses significant portions of your environment.

Why Some Pentests Are Very Expensive

Premium pricing is not always justified. Some large consulting firms charge significant premiums reflecting brand name and overhead rather than testing quality. A Big Four firm is not necessarily providing better penetration testing than a specialized boutique — in many cases, the inverse is true.

How to Evaluate a Proposal

  • Ask specifically: is this manual testing or primarily automated scanning?
  • Ask about the certifications held by the engineers who will actually perform the test
  • Ask whether any work is subcontracted or performed offshore
  • Ask to see a sample report — report quality is indicative of test quality
  • Ask about experience in your specific industry and with your technology stack

Transparent pricing. No surprises.

Grid32's online quote builder gives you a clear, scope-based price. Build your quote in minutes.

KnowledgeNetwork PentestingAttestation Reports

Do You Provide Attestation and Client-Facing Reports?

How Grid32's attestation reports work and how organizations use them to satisfy auditors, customers, and cyber insurers.

What Is an Attestation Report?

An attestation report confirms that an independent security assessment was conducted, summarizes the scope and methodology, and attests to the overall security posture of the tested environment — typically without disclosing specific vulnerabilities discovered. It provides proof that you have taken proactive steps to validate your security without exposing sensitive findings to external parties.

Who Uses Attestation Reports?

  • Customers and clients — Enterprise customers increasingly require vendors to demonstrate independent security assessments. An attestation report satisfies this without sharing your internal findings.
  • Auditors — SOC 2, HIPAA, and other frameworks require evidence of security testing. Grid32's reports are structured to satisfy these requirements directly.
  • Cyber insurers — Many carriers require or provide premium discounts for organizations with documented penetration testing.
  • Regulators — Financial regulators (FINRA, FFIEC) and government contractors (CMMC) may require documented evidence of security assessments.
  • Board and senior leadership — A board-level attestation summary provides governance evidence that security testing is occurring regularly.

What Grid32 Provides

In addition to standard deliverables (executive summary, technical report, findings inventory), Grid32 can prepare customized attestation letters and client-summary documents tailored to your specific use case — whether you need to satisfy a customer questionnaire, regulatory submission, or audit requirement.

Give your customers and auditors the proof they need.

Grid32 provides attestation and client-summary documentation as part of every engagement.

KnowledgeNetwork PentestingCyber Insurance & Pentesting

I Have Cyber Insurance — Do I Still Need Penetration Testing?

Why cyber insurance and penetration testing serve different purposes — and why more insurers are requiring testing as a policy condition.

Insurance Pays for Breaches — Testing Prevents Them

Cyber insurance and penetration testing are not alternatives — they're complements. Insurance provides financial recovery after a breach occurs. Penetration testing reduces the likelihood and severity of a breach occurring in the first place. One addresses consequence; the other addresses probability.

Cyber Insurers Are Increasingly Requiring Pentesting

The cyber insurance market has hardened significantly in recent years, driven by substantial losses from ransomware and data breach claims. In response, insurers have raised premiums, tightened coverage terms, and increasingly require applicants to demonstrate security hygiene — including documented penetration testing — as a condition of coverage or to qualify for better rates.

What Insurance Won't Cover

  • Reputational damage that your policy doesn't quantify
  • Regulatory fines and penalties in many jurisdictions
  • Loss of customer trust and contracts following a disclosed breach
  • Operational disruption of incident response, regardless of insurance payout

Policy Exclusions

Many cyber insurance policies include exclusions for breaches where the organization failed to maintain reasonable security practices. A history of penetration testing and documented remediation is evidence of reasonable security practice — which matters if you ever need to make a claim.

Reduce your risk and your insurance costs.

Grid32 provides the documented testing evidence that insurers, auditors, and customers increasingly require.

KnowledgeNetwork PentestingMy Admin Says We're Secure

"Our IT Admin Says We're Secure" — Why That's Not Enough

Why internal confidence in your security posture is not a substitute for independent validation.

Internal Assessment Has Inherent Blind Spots

IT administrators and internal security teams are excellent at what they do — but they're assessing the same systems they built, configured, and maintain. That proximity creates blind spots. They know what they intended to build; they don't always see the gap between that intention and what was actually deployed. An outside team with no prior knowledge of your environment and an adversarial mindset will find things that internal teams consistently miss.

What Organizations Typically Find on Their First Test

In our experience over fifteen years and thousands of engagements, organizations that have never had a formal penetration test — regardless of how confident they feel — have significant findings. Common discoveries include:

  • Legacy systems or services running that IT wasn't aware of
  • Default or weak credentials on network devices, servers, or applications
  • Overly permissive internal access controls that allow lateral movement to sensitive assets
  • Unpatched systems in areas considered "low priority" that provide escalation paths
  • Web application vulnerabilities not discovered in development or QA
  • Wireless networks not properly segmented from the corporate environment

The CFO Analogy

No finance leader would tell their board "we don't need an external audit because our CFO says the numbers are right." The value of an independent audit is precisely its independence. Security is no different.

Give Your Admin the Backup They Need

An independent penetration test doesn't undermine your IT admin — it supports them. It provides evidence-based findings that make the case for remediation investment, and it gives leadership the independent validation they need to trust that your security posture is what it appears to be.

Find out what "secure" actually means for your environment.

An independent test from Grid32 gives you certainty — not confidence. There's a difference.

KnowledgeWeb App PentestingWhat Is Web App Pentesting?

What Is Web Application Penetration Testing?

A complete introduction to web application security testing — what it is, how it works, and why automated scanners aren't enough.

Web Applications Are a Primary Attack Target

Web applications are internet-facing, handle sensitive user data, and are built under constant development pressure — making security an easy afterthought. They're among the most commonly exploited assets in data breaches. Web application penetration testing is the most effective method available for identifying security flaws before attackers do.

What Is Web App Pentesting?

Web application penetration testing is a manual security assessment of your web application, its APIs, and the underlying infrastructure. Our engineers assess the application from multiple angles: as an unauthenticated external attacker, as a standard logged-in user, and as a privileged user — attempting at each level to access data and functionality they shouldn't be able to reach.

What We Look For

  • Injection vulnerabilities (SQL, command, LDAP, XPath)
  • Broken authentication and session management
  • Sensitive data exposure and insecure transmission
  • Insecure direct object references and broken access controls
  • Security misconfigurations and verbose error messages
  • Cross-site scripting (XSS) and cross-site request forgery (CSRF)
  • Business logic vulnerabilities unique to your application
  • API authentication and authorization flaws

Why Automated Scanners Aren't Sufficient

Automated scanners are fast and inexpensive, but they miss the vulnerabilities that matter most: business logic flaws, authentication bypasses, and complex attack chains. A scanner finds a known SQL injection pattern; a skilled engineer finds the combination of three individually-minor issues that together allow account takeover. Grid32's methodology is manual-first.

Your web application deserves more than a scanner report.

Grid32's AppSec engineers provide the depth of analysis your application security requires.

KnowledgeWeb App PentestingAreas of Web App Testing

Web App Testing Scope: External, Credentialed & API

The different areas of web application penetration testing — what each perspective covers and why testing from multiple angles matters.

Unauthenticated (External) Testing

Unauthenticated testing simulates an anonymous attacker with no login credentials — attempting to exploit vulnerabilities visible from the public-facing application. This reveals information disclosure, injection vulnerabilities, authentication bypass opportunities, and any content or functionality that should require authentication but doesn't.

Authenticated (Credentialed) Testing

Authenticated testing provides our engineers with standard user credentials and assesses what a logged-in user can access or manipulate beyond their intended permissions. This is where broken access control, insecure direct object references, privilege escalation, and horizontal privilege issues (accessing other users' data) are discovered. Many clients are surprised to learn that the most severe vulnerabilities in their application are in the authenticated portions — areas that external scanners never reach.

API Security Testing

Modern applications expose much of their functionality through APIs. These endpoints are frequently less scrutinized than the visible front-end, and often contain the same — or worse — vulnerabilities. API penetration testing specifically addresses authentication, authorization, rate limiting, input validation, and data exposure across your API layer.

Infrastructure and Hosting Review

Beyond the application code itself, we assess the security of the hosting environment — cloud configuration, server hardening, TLS configuration, dependency vulnerabilities, and deployment practices. Application-layer findings are often compounded by infrastructure weaknesses that amplify their impact.

Comprehensive web app security starts with the right scope.

Our team will help you define the right assessment for your application.

KnowledgeWeb App PentestingOWASP Methodology

OWASP Testing Methodology: What It Is and Why It Matters

What OWASP is, why the OWASP Top 10 is the standard framework for web application security, and how Grid32 applies it in every engagement.

What Is OWASP?

The Open Web Application Security Project (OWASP) is a nonprofit foundation that produces freely available research, tools, and standards for improving web application security. It's maintained by a global community of security researchers and practitioners and is widely recognized as the authoritative source on web application security best practices.

The OWASP Top 10

The OWASP Top 10 is a regularly-updated list of the most critical web application security risks — based on frequency of occurrence, severity, and detectability. The current Top 10 includes categories such as Broken Access Control, Cryptographic Failures, Injection, Security Misconfigurations, and Server-Side Request Forgery (SSRF), among others. Any serious web application penetration test should systematically address every category in the OWASP Top 10.

How Grid32 Uses OWASP

Grid32's web application testing methodology is built around the OWASP Testing Guide — the most comprehensive resource for web application security assessment. We use it as the structural backbone of every web app engagement, ensuring systematic coverage of all major vulnerability classes while leaving room for creative, application-specific testing that uncovers business logic flaws and novel attack paths.

Beyond the Top 10

The OWASP Top 10 captures the most common risks — but real applications have unique attack surfaces. Our engineers go beyond the checklist, developing application-specific attack scenarios based on your technology stack, functionality, and business context. The combination of systematic coverage and adversarial creativity is what distinguishes a thorough pentest from a scan.

OWASP-aligned testing for your web application.

Grid32's AppSec team covers the OWASP framework and goes beyond it — delivering findings your development team can act on immediately.

KnowledgeWeb App PentestingAPI Penetration Testing

API Penetration Testing

APIs are increasingly the primary attack surface for sophisticated attackers. What API testing covers and why it deserves dedicated attention.

Why APIs Are a Growing Attack Target

Modern applications are heavily API-driven. Mobile apps, single-page applications, third-party integrations, and microservices architectures all rely on APIs to function. This means that an application's business logic — and its most sensitive data — is increasingly accessible through API endpoints that may receive far less security scrutiny than the visible front-end.

What API Penetration Testing Covers

  • Authentication and authorization — Can an unauthenticated user call API endpoints? Can an authenticated user access resources belonging to other users?
  • Broken object level authorization (BOLA/IDOR) — The most common and impactful API vulnerability: changing an ID in a request to access another user's data
  • Excessive data exposure — Do API responses return more data than the client interface displays?
  • Rate limiting and resource exhaustion — Can the API be abused to enumerate users, brute-force credentials, or cause denial of service?
  • Mass assignment — Can API parameters be manipulated to write to fields that should be read-only?
  • Injection in API parameters — SQL, command, and other injection vulnerabilities via API request bodies and query strings

REST, GraphQL, and SOAP

Grid32 tests all common API architectures: RESTful APIs, GraphQL endpoints (including introspection abuse and query depth attacks), and legacy SOAP-based web services. Each architecture has a distinct attack surface, and our engineers are experienced with all of them.

Is your API as secure as your application front-end?

Grid32's web app testing includes dedicated API security assessment — ensuring nothing is left unexplored.

KnowledgeSocial EngineeringEmail Phishing Testing

Email Phishing Assessments

How Grid32's email phishing campaigns work — from basic spam simulations to sophisticated spear-phishing — and what the results tell you about your organization's risk.

Email Phishing: Still the Most Effective Attack Vector

Despite decades of security awareness campaigns, email phishing remains the single most successful method attackers use to gain initial access to organizations. A convincing email — especially a targeted spear-phishing message — is extremely difficult to distinguish from legitimate correspondence, even for trained security professionals.

How Our Email Phishing Assessments Work

Grid32's email phishing campaigns use a staged approach. We begin with broad, low-sophistication messages — the kind your email filters should catch — and progressively increase sophistication, advancing to:

  • Targeted spear-phishing using publicly available information about your organization
  • Business email compromise scenarios impersonating executives or finance personnel
  • Mimicked domains that closely resemble your organization's actual domains
  • Credential harvesting pages that capture login attempts
  • Malicious attachment simulations that assess whether users open files from unknown senders

This staged approach reveals not just whether your users will fall victim, but at what level of sophistication — which is exactly the information you need to calibrate your defenses.

What We Measure

Our email phishing report tracks open rates, click rates, credential submission rates, and attachment interaction rates across all campaign stages. Results are provided at both aggregate and individual level (where authorized), enabling targeted follow-up training for the most susceptible users.

Combining With Security Awareness Training

The results of a real phishing assessment are the most powerful input for security awareness training. Employees who fell for a simulated attack are far more receptive to learning — the experience makes the risk real in a way that generic training videos never can.

Find out how your organization responds to a phishing attack.

Grid32's phishing assessments provide the evidence you need to make the case for stronger defenses.

KnowledgeSocial EngineeringPhone Phishing (Vishing) Testing

Phone Phishing (Vishing) Testing

What vishing is, how Grid32's phone-based social engineering assessments work, and why telephone attacks remain a high-success attack vector.

What Is Vishing?

Vishing — voice phishing — is the use of telephone calls to manipulate individuals into revealing sensitive information, performing actions, or granting access they shouldn't. Attackers impersonate IT support, executives, HR personnel, vendors, or regulators to create urgency and authority that overrides users' normal judgment.

Why Vishing Works

Phone calls activate a different psychological response than emails. The real-time, conversational nature creates pressure that email does not. Caller ID spoofing makes it trivial to appear to be calling from inside your organization. And most employees have never received vishing awareness training — they're trained to spot phishing emails, not manipulative phone calls.

How Grid32's Vishing Assessments Work

Our engineers use a range of pre-designed social engineering scenarios — adapted to your organization's structure and industry — and vary techniques based on results as the engagement progresses. Common scenarios include:

  • IT help desk impersonation requesting credentials for "account verification"
  • Executive or leadership impersonation requesting urgent wire transfers or information
  • Vendor or supplier impersonation attempting to update payment details
  • HR or payroll impersonation requesting personal employee information

Both live human calls and automated scenarios are used, as attackers use both and each produces different results. All calls are designed to be non-disruptive — typically under a minute per contact.

Would your staff recognize a vishing call?

Find out with a professional social engineering assessment from Grid32.

KnowledgeSocial EngineeringSMS Phishing (Smishing) Testing

SMS Phishing (Smishing) Testing

Why text message-based social engineering is a growing and highly effective attack vector — and what Grid32's smishing assessments involve.

The Rise of SMS-Based Attacks

SMS phishing — or smishing — is one of the fastest-growing attack vectors in the social engineering landscape. Key factors make it particularly effective: most users are far less suspicious of text messages than emails, SMS bypasses corporate email filters entirely, text messages have significantly higher open and click rates than email, and two-factor authentication codes sent via SMS are a high-value target.

Common Smishing Scenarios

  • Fake IT notifications requesting credential confirmation via a spoofed login page
  • HR or payroll impersonation requesting personal information updates
  • Package delivery notifications with malicious links
  • Executive impersonation requesting urgent responses or information
  • Two-factor authentication code harvesting via social engineering

How Grid32's Smishing Assessments Work

For smishing assessments, it's best to provide Grid32 with a list of authorized employee phone numbers — ensuring we only contact authorized targets and that message rates are managed appropriately on company-provided devices. Our engineers craft messages tailored to your organization and adapt based on results throughout the campaign.

Results are reported with the same granularity as email phishing — click rates, credential submission rates, and individual-level details where authorized.

Is your organization prepared for SMS-based attacks?

Add smishing to your social engineering assessment scope and find out.

KnowledgeSocial EngineeringPhysical Social Engineering Testing

Physical On-Site Social Engineering Testing

What physical social engineering testing involves, what attackers can do with facility access, and why physical security deserves the same rigor as your digital defenses.

The Physical Attack Vector

Physical access to a facility dramatically expands an attacker's capabilities. Once inside, a threat actor can plant hardware keyloggers between keyboards and computers, deploy network implants that create persistent remote access, plug into internal Ethernet ports, access unattended workstations, or photograph sensitive documents — all without touching your digital perimeter. Despite this, physical security is the least-tested element of most organizations' security posture.

How Physical Social Engineering Testing Works

Grid32's on-site social engineering assessments involve our engineers visiting your facility and attempting to gain physical access using deception and social engineering. Methods are adapted to your building layout, access control systems, and security staff. Typical scenarios include:

  • Posing as a delivery courier or package service requiring building access
  • Impersonating an IT or facilities contractor
  • Tailgating through secured doors behind authorized employees
  • Social engineering reception or security staff to gain visitor access
  • Using exit-side doors during high-traffic periods (lunch, end of day)

What We Attempt to Do With Access

If facility access is gained, we attempt to reach network resources — internal Ethernet ports, unattended workstations, server rooms, or network closets — and document how far we were able to go. We never disrupt operations, damage property, or engage in any action that is not pre-authorized in the engagement scope.

Operational Considerations

All physical assessments are carefully scoped in advance. We work with your operations and security leadership to define clear boundaries, establish an emergency contact protocol, and ensure all testing is properly authorized. Discretion and operational safety are paramount.

Could someone walk into your facility and access your network?

Find out with a physical social engineering assessment from Grid32.

KnowledgeSocial EngineeringThe Social Engineering Report

What Does a Social Engineering Assessment Report Include?

What Grid32 delivers after a phishing or social engineering engagement — including campaign statistics, individual results, and recommendations.

A Report Designed for Multiple Audiences

Like our network and web application reports, social engineering deliverables are designed to be useful to multiple audiences — from leadership making risk decisions to HR teams managing employee follow-up to IT teams tuning email filters and security controls.

Campaign Overview and Statistics

For each campaign type conducted (email, phone, SMS, physical), the report includes high-level statistics: number of individuals tested, open rates, click rates, credential submission rates, and call interaction rates. Presented with clear visual charts that make trends and outliers immediately apparent.

Progression and Sophistication Analysis

Because Grid32's campaigns are staged — starting broad and escalating in sophistication — the report shows at what level of attack sophistication your defenses and users begin to fail. This is more actionable than a simple pass/fail rate.

Individual-Level Results

Where authorized by the client, individual-level results are included — identifying which users fell for which campaigns. This enables targeted follow-up training for the highest-risk individuals, which is significantly more effective than organization-wide generic training.

Technical Findings and Recommendations

The report also covers how email filtering systems performed, whether phishing infrastructure was detected, how quickly alerts were generated, and specific configuration recommendations for email security controls. Every report concludes with prioritized recommendations spanning technical controls, policy changes, and training recommendations.

Find out exactly how your organization responds to attack.

Grid32's social engineering assessments deliver the detailed, actionable results your security program needs.

KnowledgeBest PracticesPassword Blacklisting in Active Directory

How to Blacklist Specific Words From Passwords in Active Directory

Step-by-step guidance on implementing custom password blacklists in Active Directory using Microsoft's Password Protection feature.

Why Password Blacklisting Matters

Even with strong complexity requirements, users frequently choose passwords that include obvious words — your company name, your city, product names, sports teams, or seasonal patterns like "Summer2024!" These passwords satisfy complexity rules but are trivially guessable through targeted dictionary attacks. In nearly every internal penetration test we conduct, password spraying attacks using organization-specific terms are among the first techniques we apply — and among the most successful.

Microsoft Active Directory Password Protection

AD Password Protection has two components: the globally banned password list (maintained by Microsoft, updated automatically) and a custom banned password list that you control. Both are enforced by DC agents installed on your domain controllers, with an Azure AD Password Protection Proxy service for on-premises environments.

What to Include in Your Custom Banned List

  • Your organization's name and common abbreviations
  • Your product or service names
  • Your city, state, and office location names
  • Your domain name and subdomain names
  • Seasonal patterns ("Spring", "Summer", "Winter", "Fall")
  • Current year and near-future years
  • Common industry-specific terms in your sector
  • Names of leadership, buildings, or office locations
  • Previously breached passwords from your own environment

Implementation Steps (On-Premises AD)

  1. In the Azure portal, navigate to Azure Active Directory → Security → Authentication Methods → Password Protection
  2. Enable "Custom banned passwords" and enter your organization-specific terms, one per line
  3. Set Lockout threshold and duration appropriate for your environment
  4. Download and install the Azure AD Password Protection DC Agent on all domain controllers
  5. Install the Azure AD Password Protection Proxy service on domain-joined servers (minimum two for redundancy)
  6. Register the proxy servers with Azure AD using Register-AzureADPasswordProtectionProxy
  7. Register the forest using Register-AzureADPasswordProtectionForest
  8. Set the DC agent to Audit mode initially, review event logs, then switch to Enforcement mode

Weak passwords are among the most exploited findings in our network tests.

Find out whether your password policies are holding up under adversarial testing.

KnowledgeBest PracticesPassword Blacklisting in Microsoft 365

How to Blacklist Specific Words From Passwords in Microsoft 365

Configuring custom banned password lists in Microsoft 365 / Azure Active Directory to protect cloud accounts from organization-specific password attacks.

Cloud Account Password Security

Microsoft 365 accounts — email, SharePoint, Teams, OneDrive — are among the highest-value targets in any organization's environment. Compromising a single M365 account through password spraying or credential stuffing can provide access to sensitive emails, files, and communication that enables further attacks. Custom banned password lists are a straightforward and highly effective control.

Azure AD Custom Banned Passwords (Cloud-Only)

  1. Sign in to the Azure portal as a Global Administrator
  2. Navigate to Azure Active Directory → Security → Authentication Methods → Password Protection
  3. Under "Custom banned passwords," toggle to "Yes"
  4. In the "Custom banned password list" field, enter your organization-specific terms — one per line, minimum 4 characters, maximum 1,000 entries
  5. Save the configuration

The custom list is case-insensitive and applies fuzzy matching — common character substitutions (@ for a, 3 for e, etc.) are automatically blocked.

What to Include in Your Banned List

  • Company name and abbreviations
  • Product, service, and brand names
  • Office locations and city names
  • Domain and subdomain names
  • Common seasonal and year-based terms
  • Names of executives and well-known staff members

Pairing With Multi-Factor Authentication

Custom banned password lists significantly reduce password-based attack risk — but don't eliminate it. MFA remains the single most impactful control for protecting cloud accounts. See our Microsoft 365 security hardening guide for complete MFA configuration recommendations.

Is your M365 environment as hardened as it should be?

Microsoft 365 misconfigurations are among the most common findings in our external assessments.

KnowledgeBest PracticesPassword Policy Recommendations

Password Policy Recommendations: Strength, Length, and Rotation

Current best practice guidance on password policies — including what NIST, Microsoft, and real-world pentest experience says about length, complexity, and MFA.

Password Policy Has Evolved — Are Your Policies Current?

Password best practices have shifted significantly in recent years. NIST's updated Digital Identity Guidelines (SP 800-63B) and Microsoft's own security recommendations have moved away from several long-held conventions that are now understood to make passwords less secure rather than more.

What NIST Now Recommends

  • Minimum length of at least 8 characters — but 12–16 is significantly better; passphrases of 20+ characters are excellent
  • Do NOT require regular rotation — Mandatory periodic changes (90-day cycles) cause users to make small, predictable changes and actually reduce security
  • DO require changes on evidence of compromise — If a credential appears in a breach dataset or is suspected compromised, require an immediate change
  • Screen against known compromised passwords — Check new passwords against breach datasets and your custom banned list
  • Allow all printable characters — Don't artificially restrict special characters
  • No complexity requirements that reduce entropy — Requiring "at least one uppercase, lowercase, number, and symbol" often results in predictable patterns like "Password1!" that crack immediately

What Pentest Experience Confirms

In internal penetration tests, the most commonly cracked passwords share a pattern: they meet complexity requirements but are variations on predictable patterns. "Company2024!", "Summer23", "[City]P@ss" — these crack immediately in targeted attacks. Length is far more valuable than mandatory complexity.

Multi-Factor Authentication Is Not Optional

No password policy fully compensates for the absence of MFA. Even strong, unique passwords can be captured via phishing or keyloggers. MFA — particularly TOTP authenticator apps or hardware tokens — provides a critical secondary layer that password policy alone cannot.

Find out if your password policies are holding up under attack.

Internal network tests routinely find that weak credentials are the path of least resistance.

KnowledgeBest PracticesPreparing for a Security Incident

Things to Have in Place Before a Security Incident Occurs

The preparation that dramatically reduces the damage of a security incident — and that most organizations only wish they'd done sooner.

The Cost of Improvising During an Incident

Organizations that experience a significant security incident without an incident response plan consistently report chaotic, poorly-coordinated responses that extend dwell time, increase damage, complicate forensics, and create additional regulatory exposure. The decisions that need to be made in the first hours of a breach are far harder to make well under pressure without a pre-established framework.

Incident Response Plan

An incident response plan (IRP) documents who does what when a security incident occurs. At minimum, it should address:

  • Definition of what constitutes a security incident requiring plan activation
  • Incident response team composition and contact information
  • Escalation and notification procedures — who gets called, in what order, at what thresholds
  • Evidence preservation and forensic chain of custody procedures
  • Containment, eradication, and recovery procedures for common incident types (ransomware, data breach, account compromise)
  • External communication and public relations procedures
  • Regulatory and legal notification obligations — breach notification timelines vary by jurisdiction and industry

Retain a Security Incident Response Firm Before You Need One

Trying to hire a forensic incident response firm in the middle of an active breach is difficult and expensive. Retaining an IR firm in advance gives you a pre-negotiated agreement, a team that already understands your environment, and immediate availability when you need them.

Logging and Detection

You cannot respond to what you cannot see. Before an incident, ensure you have comprehensive logging in place — Windows event logs, firewall logs, DNS logs, authentication logs, and endpoint detection and response (EDR) coverage where possible. Logs should be centralized in a SIEM and retained for a sufficient period (90 days minimum; 12 months for regulated environments).

Backup and Recovery

Ransomware is the most common severe incident type affecting mid-market organizations. Effective, tested, offline backup — following the 3-2-1 rule (three copies, two media types, one offsite/offline) — is the single most important control for recovering from ransomware without paying a ransom. Test your backups regularly; untested backups frequently fail when needed.

Are you prepared for an incident?

A penetration test reveals your vulnerabilities before an attacker does. Contact Grid32 to discuss testing and incident preparedness.

KnowledgeBest PracticesMicrosoft 365 Security Hardening

Microsoft 365 Security Hardening Recommendations

Critical security configurations every Microsoft 365 organization should review — covering MFA, conditional access, anti-phishing, email authentication, and more.

Why M365 Security Requires Active Configuration

Microsoft 365's default security configuration prioritizes usability and broad compatibility — not hardened security. Out of the box, M365 environments frequently lack critical protections that are available but not enabled by default. Organizations that rely on default settings are leaving significant attack surface exposed. CISA and NCSC have both published specific M365 security guidance following high-profile attacks against M365 environments.

1. Multi-Factor Authentication

Enable MFA for all accounts — no exceptions. Use Conditional Access policies (available in Azure AD P1 and above) rather than per-user MFA. Disable legacy authentication protocols (IMAP, POP3, SMTP AUTH, Basic Auth) which bypass MFA entirely and represent a critical exposure in most M365 environments.

2. Conditional Access Policies

  • Require MFA for all users for all cloud apps
  • Block legacy authentication protocols
  • Require compliant or hybrid Azure AD joined devices for sensitive workloads
  • Block access from countries where you have no legitimate business presence
  • Enable sign-in risk and user risk policies through Azure AD Identity Protection (P2)

3. Email Authentication (SPF, DKIM, DMARC)

Configure SPF, DKIM, and DMARC for all sending domains. A DMARC policy of p=reject prevents your domain from being spoofed in phishing campaigns against your customers and partners. Absence of DMARC is a finding in nearly every external assessment we conduct.

4. Anti-Phishing and Anti-Malware Policies

  • Enable Microsoft Defender for Office 365 (Plan 1 minimum) for Safe Links and Safe Attachments
  • Configure anti-phishing policies with impersonation protection for executive accounts and key domains
  • Enable "First contact safety tips" to warn users receiving email from first-time senders
  • Set Safe Attachments to Dynamic Delivery to detonate attachments in a sandbox before delivery

5. Privileged Identity and Access Management

  • Reduce the number of Global Administrators to the minimum necessary (2–4 maximum)
  • Enable Privileged Identity Management (PIM) for just-in-time elevation of administrative roles
  • Create emergency access ("break glass") accounts with strong passwords and hardware MFA, documented and monitored
  • Review and remove guest accounts that are no longer active
  • Audit application permissions — third-party apps with excessive OAuth permissions are a frequent attack vector

6. Audit Logging and Alerting

  • Enable Unified Audit Logging and retain logs for a minimum of 90 days
  • Configure alerts for suspicious sign-in activity, bulk mail deletion, unusual forwarding rules, and new admin role assignments
  • Review mailbox delegation and mail forwarding rules regularly — attackers frequently establish forwarding rules for persistent access after initial compromise

Is your Microsoft 365 environment properly hardened?

Grid32's external assessments frequently identify M365 misconfigurations that create significant exposure. Find out where you stand.