The prevention from vulnerabilities:
Vulnerability Assessment is the first step that allows you to preview what may be the weaknesses of your work environment. It allows you to verify the level of global defence of your IT system. Penetration Test is the second step that exploits the vulnerabilities identified in the previous phase (VA) simulating a cyberattack by an ethical hacker to demonstrate the existence of the weaknesses and the level of risk to which the business is exposed to.
Knowing your planet is a step
towards protecting it