London: 020 0200 8142

Penetration Testing

17 January 2020 by Alex Stone

Part Two: Our guide to cyber attacks and how to tackle them Welcome to part two of our guide to cyber-attacks, where we list the common types to be aware of, alongside real-life examples and advice on tackling them. You can jump to part one here. Man-in-the-Middle (MitM) Once upon a time not so very long ago, people wrote to one another. It was an era of Basildon Bond and billets-doux, before emails and texts. Now imagine … Read More »

10 January 2020 by Alex Stone

Part One: Our guide to cyber attacks and how to tackle them Welcome to part one of our guide to cyber-attacks, where we list the common types to be aware of, alongside real-life examples and advice on tackling them. No. 1 Phishing – Also Known as Social Engineering A while back, I made phishing phone calls (sometimes referred to as vishing) to test the vigilance of a financial services firm’s employees. As a Scottish woman, my colleagues … Read More »

17 December 2019 by Alex Stone

The Business Case for Penetration Testing A penetration test, or a pen test, is a popular way to check the effectiveness of your organisation’s cybersecurity. Pen testing is typically done once or twice a year, or after any significant infrastructure or application changes. As one of the better-known cybersecurity services in the marketplace, pen-testing plays a crucial part in most security-conscious companies’ armouries. Here, we list five reasons to consider one for your business. No. 1. A … Read More »

12 December 2019 by Alex Stone

The Seven Steps to Cybersecurity Nirvana You’ve done your homework; you’ve spent some time researching penetration testing companies and you think you’ve a good one. Maybe you used our previous blog to help: Booking a Penetration Test? Read This First. We hope you chose us, but if not, we hope you’ll read on anyway. Now you have a date for your pen test in your diary, you’ve done the hard part, right? Alas no, there’s a lot … Read More »

4 December 2019 by Alex Stone

How to Make the Best Choice Are you a pen test newbie?  Or perhaps you arranged a cyber penetration test in the past and didn’t receive  the service you expected. If so, this blog will help you. FACT: Penetration testing isn’t cheap. The day rate for a penetration tester ranges from £600 to £3,000 with travel and (potentially) accommodation on top. But let’s put this into context; you’d pay triple to avoid the blindsiding consequences of a … Read More »

28 May 2019 by Christine Ellis

Perspective Risk’s Cyber Security Capabilities Commended Perspective Risk – an IT Lab company – awarded ‘Best Penetration Testing Specialists in England’ by AI Global Media. In our increasingly digitised world, no organisation is immune from cyber-crime. Penetration Testing – a simulated cyber-attack to check computer systems for vulnerabilities – is one of the most popular security services in the marketplace. We are delighted to announce our recognition as the best penetration testing specialist in England. “The Cyber … Read More »

2 November 2018 by Fin McIntyre

Same, Similar or Completely Different? In this concise article,we’ll break out the similarities and the differences between red team testing and penetration testing to answer the question regarding their effectiveness. We’ll also help you decide which is the best approach for your organisation. The first thing to acknowledge is that both red team testing and penetration testing have certain similarities – both are designed to uncover weaknesses in your security defences. However, they do differ considerably in … Read More »

24 October 2018 by Fin McIntyre

Attackers, Defenders and a Referee A red team exercise is an “all-out” effort to penetrate an organisation’s security defences. The objective is to gain access to systems via physical breaches, computer networks, phone systems, RF (radio frequency) systems and employee manipulation. The concept derives from simulation exercises run in the military and mirrors a real-world attack scenario. It’s designed to expose shortfalls, vulnerabilities and loopholes. This exercise cuts through any vagueness or unfounded assumptions surrounding an organisation’s … Read More »

16 October 2018 by Fin McIntyre

Make Sure You’re getting a Porsche and not a Lada Following on from our previous blog “A Convincing Argument for Penetration Testing”, let’s now look at how to successfully navigate a crowded marketplace and choose a penetration test provider shrewdly. There are hundreds of companies offering penetration tests in the UK. When you hand over the keys to your organisation (metaphorically speaking), how can you have confidence your penetration tester will apply the controls required to protect your sensitive … Read More »

8 October 2018 by Fin McIntyre

Is Your Business Safe From Hackers? It’s possible a hacker is examining your business right now. He’s intelligent, he’s resourceful, and he’s looking to exploit any shortfalls he uncovers in your security measures. Whatever he finds, he’ll be sure to exploit it. The consequences might be negligible, or they could be catastrophic for business continuity. What will he find and what loss or damage to sensitive data might result? How costly would it be to your business … Read More »

31 March 2017 by Marius Cociorba

Ethical Hacking Welcome to the first of a series of posts addressing what it takes to be an ethical hacker, written by Perspective Risk’s Penetration Tester Marius Cociorba. Each week he discusses one element he considers key to being a security consultant, especially in the context of pen testing. References to further reading are included where helpful. Volumes have been written about careers in the infosec industry, many of which influenced Marius when he began his journey in … Read More »

22 March 2017 by Christine Ellis

Pentesting – A Guide to Buying What to check before purchasing a Penetration Test As a first time buyer looking for a pentesting provider, or perhaps a second time buyer with lightly toasted fingers, what criteria should you use when selecting a penetration testing company? Want to know more? Get in touch with one of our experts today Choosing a pentest supplier can present a risk in itself. In our Buyer’s Guide for Penetration Testing, we help … Read More »

24 February 2017 by Abdul Ikbal

Protect Your Premises: Tips from PR’s Security Experts Two of Perspective Risk’s physical security specialists – Abdul Ikbal and Neil Gibb* – share advice for improving the security of your building against criminals, malicious insiders and careless staff. Other security consultants and many clients are often surprised to learn that we can usually compromise a building’s security perimeter in under an hour. One customer commented: “It would be great to have a reference to prepare us before … Read More »

17 February 2017 by Abdul Ikbal

Think your Defences are Hard to Breach? Think Again   Greetings to the last in our Breakfast series by Perspective Risk’s (PR’s) cyber-security expert Abdul Ikbal. In this post, Abdul tells how seemingly small chinks in an organisation’s armour can enable attackers to make huge gains. Red Teaming – what we’ve learned so far During this series I’ve shown how I can compromise your security by: Breaking into your building Convincing you to handover your password Seeing … Read More »

2 February 2017 by Abdul Ikbal

A Phishy Tale: Click and I’m Inside your Network Greetings to the latest in our Breakfast Series by Perspective Risk’s (PR’s) Red Teamer Abdul Ikbal, where he advises on network security and share insights in the life of an ethical hacker. In this blog he tells how he – and the bad guys – can access your network and how to improve your security. You can catch up on the series here: How I break into your building, … Read More »

6 January 2017 by Abdul Ikbal

Red Teaming: Can I has your password? Greetings to no. 3 of our ‘Breakfast Series’ by PR’s senior consultant Abdul Ikbal. Abs specialises in cyber security, has been in the industry for over five years, and is a valued member of our Red Team. Here he shares advice on password security. You can catch Abs’ previous breakfast posts here: How I break into your building and Pentest interview do’s and don’ts. I will find the flaws in your … Read More »

21 December 2016 by Abdul Ikbal

Top Tips for a Pentest Interview  Welcome to the second of our ‘Breakfast Series’ by information security specialist Abdul Ikbal. You can catch the first one here: How I can gain access to your building. This series is designed as a quick read over your morning coffee, or, if you’re reading this over the festive holiday, your morning eggnog. Abs is one of Perspective Risk’s Managing Consultants and has conducted more interviews for penetration testers than you’ve … Read More »

2 December 2016 by Matthew Byrne

Kerberos: Enumerating Domain Usernames Enumerating domain account names Welcome to a technical blog post for Penetration Testers by our Principal Security Consultant, Matt Byrne. In recent years, enumerating valid operating system level user names from up-to-date, well maintained Windows environments – even from an internal test perspective, has become increasingly unlikely. Where RID cycling once provided a full list of domain users, this is no longer the case. However, for internal assessments, the Kerberos service (88/tcp) still … Read More »

18 November 2016 by Tom Sherwood

Make the most of your Penetration Test   Perspective Risk’s Penetration Tester Tom Sherwood shows you how to make the most of your pen testing by taking care of some security basics yourself. Your testers’ time will be used to better effect and you’ll gain more from your investment. Want to know more? Get in touch with one of our experts today Here we look at 5 ways you can carry out simple hardening of your servers. … Read More »

11 November 2016 by Marius Cociorba

Part 5:5 Running unsupported operating systems and applications on your network During Pen Test engagements, our Cyber-Security specialists consistently encounter the same security weaknesses. Five risks to organisations hold top position, whatever their sector or scale. In this fifth and final part of our blog series by PR’s Marius Cociorba, we look at the dangers of running unsupported operating systems or software on your network. Want to know more? Get in touch with one of our experts today … Read More »

We are Perspective Risk

  • Information security is crucial to every aspect of your business – operational efficiency, profitability, business continuity, customer confidence, brand loyalty, protection against fraud and meeting regulatory requirements.

    Our penetration testing, pen testing, pen tests and cyber security testing has proven time and time again to be an effective security assessment of business IT infrastructure.

    Perspective Risk provides in-depth security assessments, risk management and compliance solutions to help you keep your confidential information safe and your critical systems secure. We’re innovative, flexible and supportive, helping you through any information security issues to deliver real business benefits and excellent value.

  • Call Me

    Pop your details in below and we’ll be in touch soon!

    • This field is for validation purposes and should be left unchanged.

    Get Quote
    • This field is for validation purposes and should be left unchanged.