Pentest People

View All

Most Recent Blogs

Welcome to our Cyber Security blog collection, where you'll find a wealth of knowledge and insights on the latest trends, best practices, and emerging threats in the world of digital protection. Our expert writers cover a wide range of topics, from essential security tips for individuals and businesses to in-depth analysis of recent cyber attacks and data breaches. Stay informed, safeguard your digital assets, and enhance your security posture by exploring our constantly updated selection of articles designed to keep you ahead in the ever-evolving landscape of cyber security.

Digital Operational Resilience Act (DORA) Part 2 - The Importance of Incident Response

This blog covers why Incident Response plans are so crucial as part of the new DORA Resilience Act that has just been introduced for Jan 2025 for the Financial Industry.

Digital Operational Resilience Act (DORA) Part 1 - What You Need to Know

The Digital Operational Resilience Act(DORA), introduced by the European Union, will come into effect in the financial sector from January 2025. Its purpose is to establish a comprehensive regulatory framework to assist financial institutions in effectively addressing and managing cyber security threats.

World Password Day

This blog is in light of World Password Day explaining what it is and why its so important to remind people about passwords. This blog includes some of our top tips from our consultants about why password management is so crucial.

UK Creates New Laws to Safeguard Consumers Against Cyber Threats Posed by Smart Devices

In recent news, the UK creates new laws to safeguard consumers against Cyber Threats posed by Smart Devices. Some of our managing consultants have commented on this matter.

Ransomware Series

Explore our Ransomware blog collection, featuring expert insights on the latest trends, prevention strategies, and real-life incidents. Stay informed, protect your digital assets, and enhance your resilience against ransomware with our regularly updated articles in this crucial area of cyber security.

A Recovery Guide to Ransomware: Crucial Questions Answered

This blog acts as a recovery guide to Ransomware and answers all your crucial questions about Ransomware to protect your business.

Our New Ransomware Defence Assessment

In today's digital age, organisations of all sizes face a significant threat from ransomware attacks. These malicious attacks can have a devastating impact on businesses, regardless of their scale. This blog outlines our new Ransomware Defence Assessment Service and why its so crucial to businesses to invest in.

Cyber News Series

Dive into our Cyber News blog collection, where you'll find the latest stories and updates from the ever-evolving world of cyber security. Our curated articles cover recent incidents, emerging trends, and impactful news, keeping you informed and prepared to navigate the dynamic digital landscape. Stay up-to-date with our frequently refreshed content that brings the most relevant cyber stories right to you.

Police Arrest LabHost Cybercrime Gang

This blog covers the most recent Cybercrime gang that have been arrested by police after fraudulent activity exposed. Our Incident Response expert comments on this and gives his opinion on this situation.

Roku Makes 2FA Mandatory for all After Nearly 600K Accounts Pwned

This blog highlights the importance of 2FA and how Roku have made it mandatory for all accounts after their recent attack. Featuring comments from our team members, the article includes expert advice on how crucial 2FA is.

Pentest People Announces its Assured Service Provider Status for NCSC’s Cyber Incident Exercising Scheme

Pentest People announces its ASP status for NCSC's cyber incident exercising scheme - one of the only few companies in the UK in this scheme.

2.7 SecurePortal Update: Did You Say Dashboard Widgets?

This blog announces our updates to SecurePortal 2.7, including release notes and all the new updated features with SecurePortal 2.7 that you need to know.

Technical Help Series

Introducing our latest collection of expert blogs on "Technical Help in Cybersecurity," designed to empower individuals and organisations with the knowledge and resources to safeguard their digital assets. Dive into cybersecurity as we explore the current landscape, the critical role of technical help, and best practices for seeking professional assistance. Equip yourself with practical DIY tips and tricks, and discover the emerging technologies shaping the future of cybersecurity.

Top 5 Cyber Resilience Tips

This blog highlights the top 5 cyber resilience tips for businesses to be aware of when safeguarding your online presence. Have a read of our top tips.

Capturing Password Hashes: LLMNR/NBT-NS/mDNS Poisoning

This blog is about capturing password hashes and what DNS involves. Have a read below about how hackers can exploit this.

Understanding Incident Response

The blog discussed the key components of creating an effective incident response plan including identifying and prioritising IR plans, defining response procedures, and expectations such as updating the plan regularly.

Incident Response Service Breakdown

This blog breaks down our Incident Response Service including what is Incident Response, why businesses need it and how our IR package can help.