Can your site be easily used to attack your business reputation, data, database, server, or network?
Many web sites contain overlooked details in coding and configuration that are easily exploited by people with little skill and free or low cost software tools. Many of these problems cannot be located by automated vulnerability or penetration test scans and require personal attention to details unique to each web site.
Examples
Replacement of your home page with an embarrassing graphic page
Purchasing items for a price set by the attacker instead of the posted price
Viewing an entire database of client details
Viewing web site pages not intended for public viewing
Display of "raw" error messages from your database or application, or unsightly content in the wrong place on a web page.
Can your site can be easily used by outsiders to attack your client's computers?
Both visitors and logged-in clients to your web pages can have malicious scripts delivered to their computers from your web site, which can capture their passwords and other information, or completely compromise their computers. You and your clients will be protected from this type of attack if your web site does not allow cross site scripting.
Do your home web page and other key pages display correctly in widely used web browsers?
There are multiple versions of 4 browsers in common use, with most running on Windows and Mac computers, iPhones and iPads, and with different screen resolutions. Some web sites have their correct appearance in 1 or 2 browsers or resolutions, but then appear broken or with parts missing in other browsers. We look at dozens of combinations, and let you know about any that we think you wouldn't want your visitors to see.
Does your site have broken links that make part of your site unreachable?
We test links and buttons on each page so you don't have to. We let you know which links and buttons don't work the way visitors expect.