We recommend performing an initial scan before offering the new service to your customer. This will give you an insight into the security situation and enable you to start the sales pitch with specific arguments.
Auditing the external infrastructure is an easy way to get started, as it involves (almost) no effort on your part.
Enter the desired domain, lywand automatically detects all sub-domains. You can start the external scan with the click of a button.
In most cases, the internal assessment of the security situation will reveal more vulnerabilities.
For this, you install the agent on a small number of end devices for testing purposes. As soon as these are installed, they automatically provide results.
"The threat situation in the IT world is changing every day. Small and medium-sized enterprises are increasingly being caught in the crosshairs of attackers."
Possible question from the customer:
"I have a good rating, why do I even need that?"
General Arguments
(External) security is basically provided
Currently few to no vulnerabilities in the used products
But IT world is moving very fast
New vulnerabilities in products are revealed every day
In 2022, 9 out of 10 companies were victims of a hacker attack
Regular checks are necessary to avoid additional costs
Not yet checked internally?
Probability very high that vulnerabilities are still dormant internally
Ransomware is currently very popular with hackers, as little expertise & resources are required
Possible question from the customer:
"You are in charge of my IT after all, why do I have a bad rating?"
General Arguments
Problems with used products that should be fixed immediately
Reasons: external factors such as weaknesses of product suppliers, lack of product-specific "best practices" are outside our sphere of influence
Continuous monitoring is necessary to quickly identify and remedy these vulnerabilities
Reduction of the attack surface, through the gained knowledge
Minimising the time window for hackers to exploit security vulnerabilities
Business operations paralyzed
Stolen customer and company data
Encrypted systems
Ransom payments
Reputational damage
Loss of competitiveness
The focus should lie on committing the customer in the long term in the course of regular security checks.
Different options are available to you depending on the depth of service. You are welcome to take inspiration from our partners' tried-and-tested offer variants here.