04/2/2020 APPLICATION SECURITY, VULNERABILITIES What is Penetration Testing? Here’s Why Every Business Needs a Pen Test