Password autofill: Is it safe?
Password autofill is a service that you have probably been using for years without thinking much about it. Nothing is more convenient than visiting a website and the browser automa
What is Red Teaming?
Cyber threats continue to evolve at an unprecedented rate, placing cyber security at the top of the agenda when businesses consider risk mitigation. Red teaming is an effective app
Cybersecurity when working from home
More people are working remotely to keep the economy going during the COVID-19 crisis, which has seen work from home become the new norm. Remote working, whether temporary or full
A beginners guide to biometric security
Applications and computer networks continue to infiltrate our business and personal lives, giving rise to a need for more efficient access and authentication models. Traditionally,
Why password security is so important for protecting businesses
Strong password security is vital for any business looking to meet its cybersecurity responsibilities. However, through our analysis of penetration testing data and password patter
Password Security & Password Managers
The passwords we don’t use very often can sometimes be impossible to remember. Passwords we use often are more likely to be easier to remember, particularly if we use the same pa
How Penetration Testing Protects Personal Information
What is personal data? As you might expect, personal data is any information that helps to identify you. Demographic details like name, location and gender etc. are low level. This
HOW PENETRATION TESTING HELPS BUSINESS CONTINUITY
Why Penetration Testing Is The Key To Business Continuity What is Business Continuity? Businesses face huge risks to their daily survival. These include things like natural disaste
Everything you need to know about Penetration Testing
This article contains everything you need to know about cornerstones of IT security, penetration testing - otherwise known as pen-testing. We’re going to go over what penetration
Can Hacking Ever Be Considered Ethical?
The phrase ‘hacking’ conjures up images of devious cybercriminals. However, in the pure sense, a hacker is anybody who uses their knowledge and expertise in computer software o