..... ..... .....
..... ..... .....
...... ......

Pentest People
Blogs

View All

Most Recent Blogs

Welcome to our Cyber Security blog collection, where you'll find a wealth of knowledge and insights on the latest trends, best practices, and emerging threats in the world of digital protection. Our expert writers cover a wide range of topics, from essential security tips for individuals and businesses to in-depth analysis of recent cyber attacks and data breaches. Stay informed, safeguard your digital assets, and enhance your security posture by exploring our constantly updated selection of articles designed to keep you ahead in the ever-evolving landscape of cyber security.

Women in Tech: How Many Women Are in Cyber Security?

In support of International Womens Day, we are exploring the role of women in the cyber security industry and how many women there actually is in cyber roles.

Achieving PSN Compliance: Why It Matters for Your Organisation

This blog covers why achieving PSN Compliance matters for your organisation and how it benefits the business. This blog answers the questions of how does compliance add value to your business and how it increases stakeholder trust.

SecurePortal 2.11 - Single Sign On (SSO) and Requested Upgrades

Discover how Pentest People’s latest updates to SecurePortal—featuring Single Sign-On (SSO), Company Tasks, and Quick Filters—are transforming task management, enhancing security, and streamlining workflows. Stay organised, save time, and experience a smarter way to manage your assessments!

What Is Data Poisoning: Everything You Need To Know

This blog covers what Data Poisoning is and why its such an important topic to talk about and how the attack works as well as the effects of data poisoning on a company.

Ransomware Series

Explore our Ransomware blog collection, featuring expert insights on the latest trends, prevention strategies, and real-life incidents. Stay informed, protect your digital assets, and enhance your resilience against ransomware with our regularly updated articles in this crucial area of cyber security.

A Recovery Guide to Ransomware: Crucial Questions Answered

This blog acts as a recovery guide to Ransomware and answers all your crucial questions about Ransomware to protect your business.

Our New Ransomware Defence Assessment

In today's digital age, organisations of all sizes face a significant threat from ransomware attacks. These malicious attacks can have a devastating impact on businesses, regardless of their scale. This blog outlines our new Ransomware Defence Assessment Service and why its so crucial to businesses to invest in.

Cyber News Series

Dive into our Cyber News blog collection, where you'll find the latest stories and updates from the ever-evolving world of cyber security. Our curated articles cover recent incidents, emerging trends, and impactful news, keeping you informed and prepared to navigate the dynamic digital landscape. Stay up-to-date with our frequently refreshed content that brings the most relevant cyber stories right to you.

Upcoming Election - Cyber Risks to The Public Sector

With the elections coming up this week, this means a huge cyber threat towards the upcoming vote. This blog outlines cyber threats, the risks of mis and dis information and AI generated fake news. Read this blog to find out what the risks are in relation to the election that you need to be aware of.

Operational Technology Penetration Testing & The Importance of OG86

This blog covers Operational Technology Penetration Testing and what this means for businesses. This blog also highlights the importance of OG86 and its importance to Operational Technology Penetration Testing for following these practices.

Police Arrest LabHost Cybercrime Gang

This blog covers the most recent Cybercrime gang that have been arrested by police after fraudulent activity exposed. Our Incident Response expert comments on this and gives his opinion on this situation.

Roku Makes 2FA Mandatory for all After Nearly 600K Accounts Pwned

This blog highlights the importance of 2FA and how Roku have made it mandatory for all accounts after their recent attack. Featuring comments from our team members, the article includes expert advice on how crucial 2FA is.

Technical Help Series

Introducing our latest collection of expert blogs on "Technical Help in Cybersecurity," designed to empower individuals and organisations with the knowledge and resources to safeguard their digital assets. Dive into cybersecurity as we explore the current landscape, the critical role of technical help, and best practices for seeking professional assistance. Equip yourself with practical DIY tips and tricks, and discover the emerging technologies shaping the future of cybersecurity.

Top 5 Cyber Resilience Tips

This blog highlights the top 5 cyber resilience tips for businesses to be aware of when safeguarding your online presence. Have a read of our top tips.

Capturing Password Hashes: LLMNR/NBT-NS/mDNS Poisoning

This blog is about capturing password hashes and what DNS involves. Have a read below about how hackers can exploit this.

Understanding Incident Response

The blog discussed the key components of creating an effective incident response plan including identifying and prioritising IR plans, defining response procedures, and expectations such as updating the plan regularly.

Incident Response Service Breakdown

This blog breaks down our Incident Response Service including what is Incident Response, why businesses need it and how our IR package can help.