Protecting critical assets from severe threats begins with securing your network and all the devices connected to it. It is crucial to thoroughly test all the potential points of an attack, after identifying every live host, open port and available service.