DontCry over WannaCrypt Want to check how good your organisation’s security is? Click here. If you’re reading this article it’s not because you’ve randomly stumbled across the hashtags “WannaCry”, “WCry”, “WannaCrypt”, “Ransomware” etc. It’s because you’re already aware of it. Now, what can we add to the hundreds of articles on the recent breach via ransomware and the NSA vulnerability/exploit MS17-010? To sum it up, these are following mediums discussing WannaCry: Tweets Articles Blog posts Newspaper columns … Read More »
No. 2: Identity Federation and User Identities in the Cloud Greetings to the second of our five part series addressing the top vulnerabilities and misconfigurations common in the cloud environment. Previously, InfoSec pro Sasha Raljic discussed accountability and data ownership in the cloud and the importance of determining the rightful data owners. Here, he looks at user identity federation and the importance of managing user identities across the cloud environment so that an appropriate level of access is … Read More »
Taking a Pragmatic Approach to the GDPR Want to check how good your organisation’s security is? Click here. The General Data Protection Regulation aims to harmonise and toughen minimum standards for protecting the personal information of EU citizens. It applies to any organisation doing business with EU member states, regardless of where it’s headquartered. Brexit, whether hard, soft or any other variant, will not affect the introduction of the regulations. Establishing how commercial, public and third … Read More »
Remote Desktop Service (RDS) Greetings to the second of our Reducing Your Risks blog series. Written by PR’s team of Penetration Testers with a combined experience of 25 plus years, we look across the spectrum of IT risks and offer tips to improve your organisation’s security. Here, we address Remote Desktop service vulnerabilities, the common threats, and how to guard against them. Remote Desktop service (RDS), known as Terminal Services in Windows Server 2008 and earlier, is a … Read More »
SSL / TLS Certificate Security Welcome to the first of our Reducing Your Risks blog series where we address a range of security vulnerabilities and share best practice to protect your organisation from threat actors. Here, our senior cyber security pro Abdul Ikbal looks at common SSL / TLS certificate weaknesses, the risks, and what you can do about them. SSL (Secure Sockets Layer) If you’re still using SSL v3 or below, I feel bad for you son, you … Read More »
The Cyber Essentials Scan Hello and welcome to the third of our Cyber Essentials (CE) blog series, where we help you improve your chances of Cyber Essentials certification. As an external certifying body, we encounter common errors which can result in a disappointing fail. In our previous post we provided guidance on the Cyber Essentials Questionnaire. Here our Cyber Security pro Abdul Ikbal discusses the next stage: the Cyber Essentials scan. What is the Cyber Essentials Scan? The … Read More »
The Cyber Essentials Questionnaire Greetings to the second part of our Cyber Essentials (CE) series. Here, our infosec specialist Abdul Ikbal shares some quick advice on the Cyber Essentials Questionnaire. Cyber Essentials is a UK government endorsed standard. It demands compliance with a range of security measures that afford protection against common threats. Certification demonstrates to the wider world that information security is important to you and reassures those whose data you manage. The first stage towards … Read More »
Ethical Hacking Welcome to the first of a series of posts addressing what it takes to be an ethical hacker, written by Perspective Risk’s Penetration Tester Marius Cociorba. Each week he discusses one element he considers key to being a security consultant, especially in the context of pen testing. References to further reading are included where helpful. Volumes have been written about careers in the infosec industry, many of which influenced Marius when he began his journey in … Read More »
Pentesting – A Guide to Buying What to check before purchasing a Penetration Test As a first time buyer looking for a pentesting provider, or perhaps a second time buyer with lightly toasted fingers, what criteria should you use when selecting a penetration testing company? Want to know more? Get in touch with one of our experts today Choosing a pentest supplier can present a risk in itself. In our Buyer’s Guide for Penetration Testing, we help … Read More »
The Cyber Essentials Assessment Welcome to the first of our Cyber Essentials (CE) series, where our sysadmin Neil Gibb* tackles the unattractively named Bloatware and shows why it’s a barrier to valuable CE certification. Preparing your corporate network for the Cyber Essentials or Cyber Essentials Plus assessment can be daunting, and often presents more questions than answers. In this series we set out to answer the common questions. We’ll share practical, step-by-step guidance and help you on … Read More »
Your Digital Privacy – Whose Responsibility Is It Anyway? Welcome to this blog post by one of PR’s data protection experts, under his pen name Fin McIntyre. The main problem in the digital world right now is you. Cast your mind back (or, if you’re a millennial, imagine) to a time when the biggest risk to your personal information was leaving your wallet on the bus, not falling victim to cyber crime and having it sold off on … Read More »
No. 1: Accountability and Data Ownership in the Cloud Welcome to the first of five posts addressing the security of your data in the cloud by Perspective Risk’s cyber risk specialist Sasha Raljic. The beginning of March saw Amazon’s Web Services in meltdown. In simple terms, this meant its business customers – circa 350,000 organisations – were stymied. Websites, back-end storage, apps and Internet of Things gadgets relying on the platform were summarily knocked offline for five … Read More »
Protect Your Premises: Tips from PR’s Security Experts Two of Perspective Risk’s physical security specialists – Abdul Ikbal and Neil Gibb* – share advice for improving the security of your building against criminals, malicious insiders and careless staff. Other security consultants and many clients are often surprised to learn that we can usually compromise a building’s security perimeter in under an hour. One customer commented: “It would be great to have a reference to prepare us before … Read More »
Think your Defences are Hard to Breach? Think Again Greetings to the last in our Breakfast series by Perspective Risk’s (PR’s) cyber-security expert Abdul Ikbal. In this post, Abdul tells how seemingly small chinks in an organisation’s armour can enable attackers to make huge gains. Red Teaming – what we’ve learned so far During this series I’ve shown how I can compromise your security by: Breaking into your building Convincing you to handover your password Seeing … Read More »
Web Application Risks: Broken Authentication Welcome to the first of five posts addressing the typical vulnerabilities found in web applications. Here, Perspective Risk’s Senior Security Consultant Kai Stimpson looks at broken authentication and how to prevent it. Neglecting to incorporate a robust authentication solution into your web app can lead to a threat actor gaining unauthorised access to it, compromising the confidentiality of your users’ data. Want to check how good your organisation’s security is? Click here. … Read More »
A Phishy Tale: Click and I’m Inside your Network Greetings to the latest in our Breakfast Series by Perspective Risk’s (PR’s) Red Teamer Abdul Ikbal, where he advises on network security and share insights in the life of an ethical hacker. In this blog he tells how he – and the bad guys – can access your network and how to improve your security. You can catch up on the series here: How I break into your building, … Read More »
Perspective Risk Identifies Vulnerability in ManageEngine Products Welcome to this technical blog by Perspective Risk’s InfoSec specialist Sasha Raljic in relation to a vulnerability he recently discovered in the ManageEngine products. Raljic responsibly disclosed the vulnerability to the vendor and they released a fix on the 25th of January, hence the publication of this information 24 hours later. Sasha Raljic Twitter: @RSasha512 Introduction to ManageEngine Products OpManager and Netflow Analyzer are two products made and distributed by … Read More »
I Can See You! Open Source Intelligence (OSINT) Welcome to no. 4 of our Breakfast Series by Perspective Risk’s senior cyber security consultant Abdul Ikbal. These posts are designed to give you some insights into the world of information security over your cornflakes. If there’s no free plastic toy in your box, expect to find some goodies here. Whether you’re looking to improve your organisation’s security or have an interest in working in infosec, read on. And … Read More »
Our choice of the best Information Security Blogs of 2016 We asked our seasoned Cyber Security specialists to choose their top InfoSec blogs from last year. The result is a hand-picked box of cyber security treasures for your delectation. Backslash Powered Scanning: Hunting Unknown Vulnerability Classes An interesting post by James Kettle of Portswigger Web Security on an alternative approach for fuzzing applications. One of the more notable techniques from last year and great for those looking to … Read More »
PR maintains status as an ISO Certified Company Perspective Risk’s (PR’s) directors are pleased to announce that following an independent audit in December, our status as an ISO Certified company was confirmed for the sixth year running. The external audit addressed PR’s compliance with two international standards: ISO 9001:2008 and ISO 27001:2013. Zero non-conformances were recorded. The ISO auditor commented that PR’s quality management systems were among the “most well-documented and best applied” he had … Read More »
We are Perspective Risk
Information security is crucial to every aspect of your business – operational efficiency, profitability, business continuity, customer confidence, brand loyalty, protection against fraud and meeting regulatory requirements.
Our penetration testing, pen testing, pen tests and cyber security testing has proven time and time again to be an effective security assessment of business IT infrastructure.
Perspective Risk provides in-depth security assessments, risk management and compliance solutions to help you keep your confidential information safe and your critical systems secure. We’re innovative, flexible and supportive, helping you through any information security issues to deliver real business benefits and excellent value.