Resources

An expert view on the modern ransomware cyber attack
Blog  |  Cyber Essentials  |  Malware  |  Network Security

An expert view on the modern ransomware cyber attack

As a growing concern, ransomware continues to evolve in complexity, finding new ways to damage indiv...

Do One Thing Today And Make Your Network More Secure
Best Practice Security  |  Blog  |  Network Security

Do One Thing Today And Make Your Network More Secure

Network Security: How You Can Improve It Today Some practical advice for system administrators from ...

Are Your Passwords Being Compromised?
Best Practice Security  |  Blog  |  Network Security

Are Your Passwords Being Compromised?

Passwords and Permissive Outbound Firewall Rules During security engagements, our consultants regula...

How to Improve Your Network’s Security
Blog  |  Network Security  |  Penetration Testing  |  Phishing  |  Red Team

How to Improve Your Network’s Security

A Phishy Tale: Click and I’m Inside your Network Greetings to the latest in our Breakfast Seri...

I Can See You! (OSINT)
Blog  |  Network Security  |  Red Team

I Can See You! (OSINT)

I Can See You! Open Source Intelligence (OSINT) Welcome to no. 4 of our Breakfast Series by Perspect...

NFSShell: Installation on Ubuntu simplified.
Network Security

NFSShell: Installation on Ubuntu simplified.

NFSShell is neat little tool that allows user level access to an NFS server and its NFS shares. It c...

Bridging Wired & Wireless Networks in VMware Player
Network Security

Bridging Wired & Wireless Networks in VMware Player

By default, VMware Player will use Network Address Translation (NAT) to provide your virtual m...

Penetration Testing for Small Businesses Part #1: Getting Started
Network Security

Penetration Testing for Small Businesses Part #1: Getting Started

Without doubt, there are many small business owners who realize the benefits of a penetration testÂ...