with what's called penetration testing to see if their id systems have improved or perhaps remain vulnerable to cyber attacks with them to look. penetration tests are basically benign hacker tests aimed at finding weaknesses in computer systems. cause to know carries out tests like this for companies in the process he and his team regularly find security flaws in i.t. systems that can be exploited by hackers very often it's the users themselves who represent the biggest weakness if they fall victim to a cyber attack they may unwittingly launch them out where themselves they're moving a tough on a folk life and the overwhelming majority of successful cyber attacks on large firms and governments in recent years have been based on a single hacking method fishing and. phishing is when the hacker attaches a document to an email or links the email to