Blog

How Penetration Testing Protects Personal Information

What is personal data? As you might expect, personal data is any information that helps to identify you. Demographic details like name, location and gender etc. are low level. This information alone does not necessarily give away your identity as there may be many users that share your name, age or date of birth. High […]

Read more

October 16, 2020

Jennifer Blake

How Penetration Testing Helps Business Continuity

Why Penetration Testing Is The Key To Business Continuity What is business continuity? Businesses face huge risks to their daily survival. These include things like natural disasters (e.g. floods and leaks), IT security issues, information protection leaks and the loss of critical employees. These could have far-reaching and disastrous effects on your organisation, the impact […]

Read more

October 12, 2020

Jennifer Blake

Everything you need to know about Penetration Testing

This article contains everything you need to know about cornerstones of IT security, penetration testing – otherwise known as pen-testing. We’re going to go over what penetration testing is and what types of pen testing there are, give some examples of how your organisation can utilise it and assess how essential it is to your […]

Read more

October 2, 2020

Jennifer Blake

Can Hacking Ever Be Considered Ethical?

What is hacking? The phrase ‘hacking’ conjures up images of devious cybercriminals. However, in the pure sense, a hacker is anybody who uses their knowledge and expertise in computer software or hardware to break down security measures on computers, networks or in applications. A hacker can be designated unethical, illegal or even morally based solely […]

Read more

September 25, 2020

Jennifer Blake

What is CREST, and why is being CREST accredited so important?

What is penetration testing? Penetration testing is the intentional execution of attacks on your IT system. they are undertaken by IT professionals, to expose the weak spots in your system’s defences. Penetration tests give a picture of the security vulnerabilities of your website, network and systems. What is a CREST penetration certificate? CREST presents the […]

Read more

September 18, 2020

Jennifer Blake

Penetration Testing: The Process

Last week we wrote about an important aspect of cyber security: penetration testing. This week, we are going to cover how penetration testing will look practically for your organisation. Scoping Scoping is the initial consultation between your organisation and the penetration testing company to outline the initial rules of engagement. This stage is to decide […]

Read more

September 11, 2020

Jennifer Blake

How Important Is Mobile App Security?

Mobile application security refers to the software, practices and methods designed to keep applications on Android, iOS and Windows safe from malicious agents. Mobile application security (or app security for short) covers apps on both smartphones and tablets. Apps are central to the function of many large companies (including banks and financial institutions); they store […]

Read more

September 4, 2020

Jennifer Blake

Top Five Pen Testing Questions

Penetration tests are intentional attacks on your IT system, executed to expose the weak spots in your system’s defences, including cross-site scripting, source codes, logic, and network configurations. Penetration tests give experts an understanding of the problems with the technical infrastructures that your company depends on.   1. What types of pen testing are there? There are […]

Read more

August 27, 2020

Dan Richards

How often should I schedule a penetration test?

The needs of every organisation or business are different, and most companies are aware that penetration testing should take place regularly. However, companies can find it challenging to determine precisely what regularly means to them and how to determine when a pen test should take place. If the amount of time between penetration tests is […]

Read more

August 21, 2020

Dan Richards