Pentest People

  |  By Pentest People
After attackers accessed around 591,000 customer accounts this year, Roku is making 2FA mandatory. Over two separate incidents, the first affecting 15,363 accounts and the second affecting roughly 576,000. In these cases, the attackers used the accounts to purchase streaming subscriptions and hardware stored in users accounts, the company has confirmed.
  |  By Pentest People
LEEDS, UK, 15th April 2024 - Pentest People, the Penetration Testing as a Service (PTaaS®) and cybersecurity experts, today announces it is the first Leeds-based cybersecurity company to become a qualified and approved Cyber Advisor (Cyber Essentials) on the NCSC’s Cyber Advisor scheme.
  |  By Pentest People
Incident response is a crucial aspect of cybersecurity that involves identifying, containment, eradicating, and recovering from security incidents. It is designed to minimise the impact of security breaches, protect sensitive data, and restore normal operations as quickly as possible. To facilitate a smooth incident response, organisations should create a comprehensive checklist that outlines the necessary steps, resources, and communication channels.
  |  By Pentest People
Pentest People are so proud to announce we have become one of the only few companies in the UK to be an Assured Service Provider in the recently launched National Cyber Security Centre (NCSC) Cyber Incident Exercising (CIE) scheme.
  |  By Pentest People
Cyber Essentials is a certification scheme developed by the National Cyber Security Centre (NCSC) in the United Kingdom. This scheme aims to help organisations establish a baseline of cyber security controls to protect against common cyber attacks. Two levels of certification are offered under the Cyber Essentials scheme: Cyber Essentials and Cyber Essentials Plus.
  |  By Pentest People
IoT pentesting, also known as IoT penetration testing, is a process of assessing the security vulnerabilities of IoT devices and networks. The purpose of IoT pentesting is to identify weaknesses in the system that could be exploited by attackers and to suggest remediation measures to enhance the overall security of the IoT infrastructure. The process of conducting a successful IoT penetration test involves several steps.
  |  By Pentest People
Penetration testing, also known as pen testing, is a method of evaluating the security of computer systems and networks by simulating an attack. It helps identify vulnerabilities and security flaws to mitigate potential risks. The article "Learn About the Five Penetration Testing Phases" discusses the five phases involved in a penetration testing process.
  |  By Pentest People
Artificial intelligence (AI) has revolutionised the field of cyber security, offering unparalleled advantages in detecting and preventing sophisticated cyber threats. From detecting anomalies in network behaviour to automating threat response, AI has become an indispensable tool for organisations looking to strengthen their defence against cyber-attacks.
  |  By Pentest People
Mobile applications, commonly referred to as mobile apps, are software programs designed to run on mobile devices such as smartphones and tablets. These apps can provide users with a wide range of functionalities, from social networking and entertainment to productivity and e-commerce. With the rapid growth of mobile technology in recent years, businesses have increasingly turned to mobile apps as a way to connect with their customers and streamline their operations.
  |  By Pentest People
Ethical hacking and penetration testing are both essential components of cybersecurity testing, but they differ in their objectives and methodologies. Ethical hacking, also known as white-hat hacking, involves simulating the actions of a malicious hacker to identify vulnerabilities within an organisation's systems and networks. The primary objective of ethical hacking is to proactively identify and address potential security weaknesses before they can be exploited by unauthorised individuals.
  |  By Pentest People
In this video, Josh breaks down Web Application Testing and the benefits of investing in this security for your business.
  |  By Pentest People
Pentest People is 6 years old! Watch our recap of the year: how it started and current projects we are working on now. Listen to our team talk about whats been happening this year and what 2024 looks like for Pentest People.
  |  By Pentest People
This podcast covers how Cameron got into the cybersecurity industry and his thoughts on sales & marketing relationships in order to produce maximum productivity.
  |  By Pentest People
Listen to Cameron and Steven discuss the success of Revenue Leaders and Entrepreneurs: what worked for them in the industry and what didn't.
  |  By Pentest People
This video acts as a guide to Infrastructure Testing and some of the techniques used in performing Infrastructure Testing.
  |  By Pentest People
Liam talks through how to protect your Cloud Security and the benefits for a business to invest in this assessment.
  |  By Pentest People
This video breaks down our Incident Response Service here at Pentest People and how it works.
  |  By Pentest People
We're proud to say we've just reached the 5-year mark. What a journey it's been. Today we sit down with one of our co-founders, who tells us where it all started and where the idea for SecurePortal & PTaaS began.
  |  By Pentest People
This video highlights the current top cyber threats of 2022 and why they are important for businesses to be aware of.
  |  By Pentest People
This video highlights what our consultants think is the one of the most important top tips for businesses to secure their cyber security safety.

Pentest People are a UK-based boutique security consultancy focussing on bringing the benefits of Penetration Testing as a Service (PTaaS) to all its clients. This innovative approach to security testing combines the benefits of a consultant-led penetration test and vulnerability assurance through a technologically advanced SecurePortal, providing a living threat system to its clients and benefit through the life of the contract rather than just a single point in time.

Redefining Penetration Testing engagements to bring you Penetration Testing as a Service:

  • Penetration Testing: Pentest People can provide all levels of Penetration Testing based on your exacting requirements. Internal and External assessments can be performed against all types of digital infrastructure.
  • Web Application Testing: Vulnerabilities in modern-day Web Applications have become a major entry point to corporate networks and also have led to many high-profile security breaches.
  • Social Engineering: Pentest People can help you design, plan and execute a Social Engineering engagement that can assess your business-critical controls, policies and procedures within your organisation.

A Fresh Approach to Penetration Testing.