Skip to content
Get In Touch

Behind the Firewall A Conversation with Mike Hughes, Visionary's System Administrator, on How We Keep Your Data Safe

Behind the Firewall

Behind the Firewall: Mike Hughes on How Visionary Keeps Your Data Safe

At Visionary, we take security seriously, not just as a policy, but as an active, ongoing practice. On a regular basis we put our own systems under the microscope through a rigorous process called penetration testing, and we think it is worth explaining why we do it and what it means for the clients and organizations we serve.

What Is Penetration Testing?

Penetration testing, often called pen testing, is a controlled and intentional attempt to breach a system's security, carried out not by bad actors, but by skilled professionals known as white hat hackers. These are ethical security experts whose job is to think like an attacker, probe for weaknesses, and expose vulnerabilities before someone with malicious intent can find them first.

At Visionary, we contract with a creative and experienced team of white hat hackers on a scheduled basis to do exactly that. We invite them in, give them room to work, and let them crawl through the numerous layers of security within our systems using the same techniques a real attacker might use including scans, probes, brute force attempts, known exploits, and more.

Why Do We Do This?

The threats on the internet are real, constant, and evolving. No system is perfect, and the best way to know where your gaps are is to find them yourself before someone else does. By working with hackers rather than against them, we gain something invaluable: honest, detailed, expert feedback on where our defenses stand.

The results of each penetration test give us a clear picture of how our systems are configured, whether our layers of protection are holding up, and where we need to make improvements. It is one of the most effective tools we have for building and maintaining resilient infrastructure.

What This Means for Our Clients

When you partner with Visionary, you are not just getting a website or a software platform. You are getting a team that holds itself accountable to the highest standards of security and proves it on a regular basis. The knowledge we gain from each round of penetration testing goes directly into making our systems stronger, our configurations tighter, and our protections more effective.

We do not wait for something to go wrong to find out where we stand. We test, we learn, and we improve continuously and proactively.

Our Commitment

Security is not a one-time checkbox. It is a discipline. From our ISO 27001 security control policies to our scheduled penetration testing process, Visionary is committed to the kind of rigorous, ongoing scrutiny that keeps our systems and yours well protected on a regular basis.

If you have questions about our security practices or want to learn more about how we protect the platforms we build and maintain, we are always happy to talk.

Like What You See? Subscribe to Our Mailing List

We won't fill your inbox with tons of emails. And you can unsubscribe at any time.