
Navigating an evolving threat: your best defence against ransomware
One of the most pervasive threats to organisations today is that of ransomware. Modern security wisd...
One of the most pervasive threats to organisations today is that of ransomware. Modern security wisd...
In the realm of cybersecurity, a red team exercise serves as a comprehensive assessment of an organi...
Cybersecurity is one of the most important concerns for businesses and individuals in the digital ag...
Most red teamers should already be aware that it is no longer as easy as it used to be to evade dete...
Modern ransomware attacks are becoming increasingly complex and can have catastrophic effects on org...
As a growing concern, ransomware continues to evolve in complexity, finding new ways to damage indiv...
During a recent red-team engagement, we encountered hosts protected by different types of Endpoint D...
In a time of high staff turnover, do you need to be worried about security Joiners and leavers are n...
Following on from my MySQL Injection Practical Cheat Sheet here is the MSSQL version. As before, I...
There are lot of excellent SQL injection cheat sheets out there; however, I found the majority provi...
Nearly 18 months ago, we were delighted to welcome Mirus IT to Content+Cloud family, as our centre o...
CVE-2017-9447 Strikes Again? Earlier this year, we were assessing a network that contained a Paralle...
A new tool to find and exploit SQL Injection vulnerabilities in Android Content Providers CPMap is a...
Vulnerability discovered by Perspective Risk’s Senior Security Consultant, Calum Hutton. Su...
Back in June 20 we made the announcement that we were part of a new group brand. From today, Perspec...
A Guiding Hand for Organisational Security: Virtual CISO (Chief Information Officer) Summary ...
Working Together to Achieve Global Standards in Security: ISO 27001 Implementation Summary Client: A...
At Perspective Risk, whilst we are officially part of the IT Lab group, we are an independently mana...
Vulnerability discovered by Perspective Risk’s Senior Security Consultant, Calum Hutton. Summary A...
Seven Things You Can Do to Reduce Your Risks In this time of heightened risk as cybercriminals seek ...
Perspective Risk provides ‘plain English’ penetration testing for SORCE Ltd SORCE regularly co...
Perspective Risk excels at penetration testing for MoneySuperMarket.com Penetration tests on complex...
Thorough and independent web security review for Clear Books. Independent review in fast-paced en...
Perspective Risk Discovers Vulnerability in Popular SIEM Product EventLog Analyser is log management...
Is Remote Working Compromising Your Cybersecurity? In the understandable rush to enable remote...
Remote Security Assessments of Internal Systems, Applications and Infrastructure In response to the ...
Get the Lowdown on the Big Changes to the Cyber Essentials Scheme Whether you have a Cyber Essential...
Part Two: Our Guide to Cyber Attacks and how to Tackle Them Welcome to part two of our guide to cybe...
Part One: Our Guide to Cyber Attacks and how to Tackle Them Welcome to part one of our guide to cybe...
The Business Case for Penetration Testing A penetration test, or a pen test, is a popular way to che...
The Seven Steps to Cybersecurity Nirvana You’ve done your homework; you’ve spent some time resea...
How to Make the Best Choice Are you a pen test newbie? Or perhaps you arranged a cyber penetration t...
Mirus IT, the long-standing Milton Keynes-based, managed services provider is now part of the IT Lab...
Perspective Risk’s Cyber Security Capabilities Commended Perspective Risk – an IT Lab company â€...
TLDR A vulnerability was identified in a Samsung system app which allows external malicious applicat...
Same, Similar or Completely Different? In this concise article,we’ll break out the similarities an...
Make Sure You’re getting a Porsche and not a Lada Following on from our previous blog “A Co...
Is Your Business Safe From Hackers? It’s possible a hacker is examining your business right now. H...
The GDPR Is Coming The GDPR is coming. It’s everywhere – mainstream news, peppered acros...
Metadata and the Risks to your Security Imagine the following scenario. A company not dissimilar to ...
Network Security: How You Can Improve It Today Some practical advice for system administrators from ...
Passwords and Permissive Outbound Firewall Rules During security engagements, our consultants regula...
Ethical Hacking Looking at what it takes to be an ethical hacker by Perspective Risk’s cyber s...
Taking the Step Up to Cyber Essentials PLUS Welcome to the fourth of our Cyber Essentials (CE) blog ...
Umbraco CMS Unrestricted File Upload Vulnerability Umbraco CMS Vulnerability Summary Vendor: Umbraco...
Web Application Risks: SQL Injection Welcome to the second of five posts on the top vulnerabilities ...
DontCry over WannaCrypt Want to check how good your organisation’s security is? Click here. If you...
No. 2: Identity Federation and User Identities in the Cloud Greetings to the second of our five part...
Taking a Pragmatic Approach to the GDPR Want to check how good your organisation’s security is? Cl...
Remote Desktop Service (RDS) Greetings to the second of our Reducing Your Risks blog series. Writte...
SSL / TLS Certificate Security Welcome to the first of our Reducing Your Risks blog series where...
The Cyber Essentials Scan Hello and welcome to the third of our Cyber Essentials (CE) blog series, w...
The Cyber Essentials Questionnaire Greetings to the second part of our Cyber Essentials (CE) series....
Ethical Hacking Welcome to the first of a series of posts addressing what it takes to be an ethical ...
Pentesting – A Guide to Buying What to check before purchasing a Penetration Test As a first t...
The Cyber Essentials Assessment Welcome to the first of our Cyber Essentials (CE) series, where our ...
Your Digital Privacy – Whose Responsibility Is It Anyway? Welcome to this blog post by one of ...
No. 1: Accountability and Data Ownership in the Cloud Welcome to the first of five posts addressing ...
Protect Your Premises: Tips from PR’s Security Experts Two of Perspective Risk’s physica...