Knowledge Center

Get the answers you need to choose the right security services for your organization..
    How Soon Can We Schedule a Test?
    FAQ  |  penetration testing  |  pentesting  |  Project
    The short and sweet answer is that once a contract has been executed by both parties, and all ...
    Continue Reading
    What Sets Secure Ideas Apart From Other Security Consulting Firms?
    Secure Ideas at a Glance As an industry leader in security consulting, training, and penetration ...
    Continue Reading
    Can you hack someone for me?
    FAQ
    We often receive emails or DM’s about someone getting stalked or someone who needs help to hack ...
    Continue Reading
    What is Internal Penetration Testing?
    Testing  |  FAQ
    Sometimes companies wonder if it is possible to perform penetration testing internally rather than ...
    Continue Reading
    Can you test our product that we sell?
    FAQ
    Many companies will purchase a product or setup network resources, and then request that those ...
    Continue Reading
    What are the credentials of your team?
    FAQ
    What are the Credentials of your Team? When you are evaluating a security consulting team, it is ...
    Continue Reading
    What is in a Penetration Test Report?
    Testing  |  Deliverables  |  FAQ
    As organizations evaluate penetration tests and other types of security consulting, one of the ...
    Continue Reading
    What is an Attestation Letter?
    Deliverables  |  FAQ
    Updated: October 15th, 2024 What is an Attestation Letter? Simply put, an attestation letter (often ...
    Continue Reading
    How Do Prepurchased Credits Work?
    FAQ
    Test Credits are essentially a currency used to streamline the process when your organization is ...
    Continue Reading
    How Do We Estimate Testing Credits?
    FAQ
    Estimating Prepaid Credits At some point you may be attempting to work out just how many Credits ...
    Continue Reading
    What's the difference between API and Web Application Pentests?
    Comparisons  |  FAQ
    Web applications are now remarkably complex. Whether its Internet of Things (IOT) devices, mobile ...
    Continue Reading