Security Blog

Feature development & monitoring tips

Category: Penetration Testing

April 14, 2022

Penetration Testing Methodologies

Penetration Testing Methodologies What is Penetration Testing? Penetration Testing, by definition, is “A method for gaining assurance in the security of an IT system by attempting to breach some or all of that system’s security, using the same tools and techniques as an adversary might.” Want to skip the read and go straight to the […]

Find Out More
April 4, 2022

The Importance of Penetration Testing for Your Business

The Importance of Penetration Testing for Your Business Did you know that a third of all businesses will experience a cyber-attack this year? And that’s just the ones that are reported! The fact is, if you’re not doing Penetration Testing on your business, you’re at risk. In this blog post, we’ll break down what penetration […]

Find Out More
March 14, 2022

What is Penetration Testing?

We revisit the core of a penetration test, looking into why they’re so necessary in the modern day, exactly what a pentest is and why businesses need them.

Find Out More
January 23, 2019

Why Developers Need Penetration Testing

Why Developers Need Penetration Testing Data breaches A quick Google search for ‘data breach’ returns countless results. Just recently our sister company, RapidSpike,  innocently found a data breach made by York City Council. It seems stories related to data breaches are reported daily. The results of a data breach vary; you could face hefty fines […]

Find Out More
February 19, 2018

Pentest People Achieves CREST Accreditation

Pentest People Achieves CREST Accreditation Pentest People are proud to announce that they have just achieved CREST accreditation for Penetration Testing. What is Crest Accreditation?  CREST accreditation is the not-for-profit body representing the technical information security industry. CREST provides internationally recognised accreditation for organisations and individuals providing penetration testing, cyber incident response and threat intelligence services. All […]

Find Out More