London: 0333 103 8161

Blog

6 January 2017 by Abdul Ikbal

Red Teaming: Can I has your password? Greetings to no. 3 of our ‘Breakfast Series’ by PR’s senior consultant Abdul Ikbal. Abs specialises in cyber security, has been in the industry for over five years, and is a valued member of our Red Team. Here he shares advice on password security. You can catch Abs’ previous breakfast posts here: How I break into your building and Pentest interview do’s and don’ts. I will find the flaws in your … Read More »

21 December 2016 by Abdul Ikbal

Top Tips for a Pentest Interview  Welcome to the second of our ‘Breakfast Series’ by information security specialist Abdul Ikbal. You can catch the first one here: How I can gain access to your building. This series is designed as a quick read over your morning coffee, or, if you’re reading this over the festive holiday, your morning eggnog. Abs is one of Perspective Risk’s Managing Consultants and has conducted more interviews for penetration testers than you’ve … Read More »

19 December 2016 by Christine Ellis

Happy Christmas from all at Perspective Risk We decided not to send Christmas cards to our customers this year, and instead donate the cost to a charity we’ve come to know well over the past few months. Christians Against Poverty helps 20,000 people a year – regardless of their religious beliefs – to free themselves from debt. We’ve been helping the charity with their information security and admire the work they do. They are also great people. … Read More »

Category: Announcements
16 December 2016 by Abdul Ikbal

Red Teaming: How I can gain access to your building Welcome to the first of our ‘Breakfast Series’ by cyber security expert Abdul Ikbal. These posts are designed as short snappy reads whilst enjoying your bowl of captain crunch, or during your much loved morning commute #sarcasm, without nodding off or closing the tab on your browser. A bit about me. I’m Abs, one of PR’s Managing Consultants. An unconventional leader (trying to be anyway) who loves … Read More »

Category: Blog, Red Team
9 December 2016 by Tom Sherwood

Maximise the benefits of your Pen Test    In this second part of our occasional series ‘Make the most of your Pen Testing‘ by our cyber security specialist Tom Sherwood, we help you take care of some security basics ahead of your pen test. This way, your consultant will have more time to focus on the trickier elements of your information security. In this post we look at 5 ways you can carry out simple hardening of … Read More »

Category: Blog
6 December 2016 by Christine Ellis

Want to check how good your organisation’s security is? Click here. A customer focused appointment Perspective Risk’s (PR’s) Directors have pleasure announcing the appointment of cyber-security expert Andy Mayo, who joins the business development unit. Andy is well-placed to support PR’s growing customer base, evidenced by a wealth of experience and qualifications, including CCNA, MSCA and CISSP. Andy has provided security consultancy to several large brands, notably Vodafone, Formula One, KPMG, Virgin and the BBC. He has … Read More »

Category: Announcements
2 December 2016 by Matthew Byrne

Kerberos: Enumerating Domain Usernames Enumerating domain account names Welcome to a technical blog post for Penetration Testers by our Principal Security Consultant, Matt Byrne. In recent years, enumerating valid operating system level user names from up-to-date, well maintained Windows environments – even from an internal test perspective, has become increasingly unlikely. Where RID cycling once provided a full list of domain users, this is no longer the case. However, for internal assessments, the Kerberos service (88/tcp) still … Read More »

24 November 2016 by Christine Ellis

The General Data Protection Regulation FAQs The rights of adults and children under the GDPR   Want to check how good your organisation’s security is? Click here. Help implementing the GDPR and safeguarding personal data Browse our GDPR Implementation page to see how we can help you or click here to contact us. We’d be glad to help. Want to know more? Get in touch with one of our experts today

Category: Blog, GDPR
18 November 2016 by Tom Sherwood

Make the most of your Penetration Test   Perspective Risk’s Penetration Tester Tom Sherwood shows you how to make the most of your pen testing by taking care of some security basics yourself. Your testers’ time will be used to better effect and you’ll gain more from your investment. Want to know more? Get in touch with one of our experts today Here we look at 5 ways you can carry out simple hardening of your servers. … Read More »

11 November 2016 by Marius Cociorba

Part 5:5 Running unsupported operating systems and applications on your network During Pen Test engagements, our Cyber-Security specialists consistently encounter the same security weaknesses. Five risks to organisations hold top position, whatever their sector or scale. In this fifth and final part of our blog series by PR’s Marius Cociorba, we look at the dangers of running unsupported operating systems or software on your network. Want to know more? Get in touch with one of our experts today … Read More »

4 November 2016 by Marius Cociorba

Part 4:5  Storing Data as Clear Text Storing data in the clear During a pen test, our InfoSec experts usually report the same security dangers, whatever the client size or type. In this weekly series, we explore five common vulnerabilites and share practical advice you can follow today. In this 4th part, we address the risks of storing passwords and other sensitive data as clear text. Want to know more? Get in touch with one of our … Read More »

27 October 2016 by Marius Cociorba

Part 3:5 Lack of Network Segregation Among the range of services we provide at Perspective Risk, penetration testing is a popular choice with our clients, from blue chips to SMEs. Regardless of their security posture, our testers regularly record the same issues. In this 5 part blog series, we share what those issues are alongside straightforward guidance to avoid them. In this 3rd part we highlight the importance of network segregation on the internal domain. Suggestions for … Read More »

20 October 2016 by Marius Cociorba

Part 2:5 Dangerous Default Credentials – secure your network  We regularly conduct network penetration tests for clients large and small, and whose security capabilities cross the spectrum.  Despite the diversity of our customer base, we frequently encounter the same vulnerabilities, the consequences of which can be bad news for an organisation’s security posture. Want to know more? Get in touch with one of our experts today In this series we  address the 5 commonest network security issues … Read More »

14 October 2016 by Marius Cociorba

Part 1:5 Weak password policies – improve your network’s security   Here at Perspective Risk, we run frequent network penetration tests for clients of all sizes and security capabilities. We observe certain issues cropping up time and time again, which can significantly affect a business’ security posture. During this series we will cover the top 5 issues we most commonly find, together with some simple remediation advice you can follow that should make a difference. This 1st … Read More »

3 October 2016 by Christine Ellis

Perspective Risk (PR) is at the Law Firms and Cyber-Attack Conference in London on the 5th of October. The event is connecting more than 150 legal professionals from across the UK with Information Security experts. Law firms are an attractive target to cyber-criminals, evidenced by the attack on Mossack Fonseca, the law firm at the centre of the Panama Papers scandal. PR’s theme: ‘How not to be the next Mossack Fonseca’ will give delegates the inside view … Read More »

Category: Announcements, Blog
14 September 2016 by Pravesh Kara

Part 5: 5 phishing tactics threatening UK businesses In our final phishing series post, we look at phishing emails designed with one purpose in mind: identity theft.    When we receive an email from Facebook, LinkedIn, Amazon or Apple, our initial reaction is to believe it as we trust the source.  Cyber criminals understand the psychology of trust and seek to   exploit it through phishing cons. It can take less than 5 minutes to create an authentic-looking phishing email … Read More »

Category: Blog, Phishing
8 September 2016 by Pravesh Kara

Part 4: 5 phishing tactics threatening UK businesses So far in this series of phishing awareness blogs we’ve looked at CEO Fraud, malicious attachments and malicious links. The previous two posts explored the techniques deployed by cyber criminals to infect recipients’ systems with malicious software.  Today’s blog looks at ransomware. Increasingly, cyber criminals are commercialising malware to blackmail their victims. This type of malware is called ransomware. Since the first cases in Russia 10 years ago, ransomware has evolved rapidly, becoming a lucrative practice for cyber criminals across the globe. The attackers send emails with … Read More »

Category: Blog, Phishing
2 September 2016 by Pravesh Kara

Part 3: 5 phishing tactics threatening UK Businesses Welcome back to our series of blog posts focussing on phishing, a method of social engineering costing UK businesses £ millions every year. In our first post we looked at CEO Fraud. In the second we shared examples of phishing emails with malicious attachments. Staying on the topic of malicious software, this post looks at phishing emails containing a link which, if clicked, installs malware.  The tactics used by cyber criminals can be ingenious. For example, there is a rise in watering hole attacks. Hackers … Read More »

Category: Blog, Phishing
1 September 2016 by Sasha Raljic

New Trojan found – Shakti modifies Windows settings to steal files Perspective Risk’s Cyber Security expert Sasha Raljic explores Shakti – a Trojan threat, in this blog post. Shakti is a data exfiltration Trojan. It emerged a few days ago when it was sent to Bleepingcomputer.com by one of their readers. On closer inspection, it was discovered that this type of Trojan searches for particular file types on the victim’s computer and uploads them to a central server. Want to check how good your organisation’s security is? … Read More »

Category: Blog, Malware
24 August 2016 by Pravesh Kara

Part 2: 5 phishing tactics threatening UK businesses In the first of our series of blog posts we gave an example of CEO Fraud. In this second blog we’re focussing on emails containing malicious attachments. We’ve all experienced arriving home from work to be greeted by a ‘We failed to deliver your parcel’ card on the doormat. The anxiety of losing that precious package typically has us rushing to the parcel depot at the first opportunity. In February this year, email scammers exploited the same emotional drivers in an email to FedEx customers. The email claimed that … Read More »

Category: Blog, Phishing

We are Perspective Risk

  • Information security is crucial to every aspect of your business – operational efficiency, profitability, business continuity, customer confidence, brand loyalty, protection against fraud and meeting regulatory requirements.

    Our penetration testing, pen testing, pen tests and cyber security testing has proven time and time again to be an effective security assessment of business IT infrastructure.

    Perspective Risk provides in-depth security assessments, risk management and compliance solutions to help you keep your confidential information safe and your critical systems secure. We’re innovative, flexible and supportive, helping you through any information security issues to deliver real business benefits and excellent value.

  • Call Me

    Pop your details in below and we’ll be in touch soon!

    • This field is for validation purposes and should be left unchanged.

    ×
    Get Quote
    • This field is for validation purposes and should be left unchanged.
    ×