Pen Test

The purpose of penetration testing

Penetration testing is the method of simulating a real-world cyber-attack on either infrastructure, an application or sometimes even on your staff. This test is strongly advised, even compulsory in some cases, as part of many security-related standards such as PCI-DSS or ISO27001. The main objective of a penetration test is to gain assurance that your[…]

HTTPS

The importance of HTTPS in web applications

Hypertext Transfer Protocol (HTTP) is a fundamental protocol that is used by the World Wide Web for viewing website content on the internet. HTTP allows us to browse the internet and navigate to our favourite websites. HTTP was not initially created with security in mind, and this meant that any information communicated between your computer[…]

Virtual Private Network Graphic

What are Virtual Private Networks and how do they work?

A Virtual private network (VPN) is a piece of software that allows you to access the internet privately, acting as a tunnel between you and your destination, enabling users to send and receive data securely across the internet. Much like having a firewall on your network to protect your computer, a VPN will secure your[…]