If Foundstone gains access, will attempts be made to leverage that access to compromise other systems?
If we gain access to a system, we stop that line of testing and take a screenshot to illustrate the level of access we obtained. We provide that information to you and work with you to determine if you would like for us to pursue that testing to further clarify the risk posed to your organization.