This website uses cookies. View our cookie policy
United Kingdom
Select regional store:

  Penetration testing resources

Download a range of different resources such as guides, datasheets, infographics and green papers providing technical guidance to help support your penetration testing programme.


Penetration testing FAQ

You have questions? Find common frequently asked question for our penetration testing services.


Guide - Cyber Testing Playbook

As cyber attacks become easier to perpetrate, organisations must improve their cyber defences by taking an integrated and intelligence-led approach to cyber security that considers technology, processes and people.

Get started with our complimentary Cyber Testing Playbook and learn how to prevent breaches, detect them when they occur and respond intelligently to minimise the impact.


Case study – Collinson Group

Collinson Group is a rapidly evolving organisation that operates a diverse set of market-leading technologies. It needs its systems to be secure and dependable, but it had no way of knowing whether its defences provide adequate protection. Penetration testing provides that information.

Download the case study to find out how penetration testing helped Collinson Group test its ability to protect its applications.


White paper - Assured Security: Getting cyber secure with penetration testing

Most organisations are the target of random, indiscriminate attacks, and they need an appropriate level of penetration testing to ensure their defences are adequate. But while many organisations know they need penetration testing, it can be hard to know how to fit them in to a larger security programme, or even how to get started.

Our white paper, "Assured Security: Getting cyber secure with penetration testing", provides a clear introduction to best-practice penetration testing.


Data sheet - Are your critical assets safe from hackers?

A penetration test identifies the vulnerabilities that leave your infrastructure and applications exposed, and gives you the information you need to close any gaps in your security.

Learn how IT Governance approaches a penetration test and how our penetration testing services can strengthen your security posture.


Infographic - What is a penetration test and why would my company need one?

Hacking is not the preserve of master cyber criminals. Unskilled computer users can easily download and run hacking software designed to search for, find and exploit known vulnerabilities wherever they occur.

This infographic gathers the latest facts and figures on cyber attacks and hacking, and offers reasons organisations should test the security of their IT infrastructure – from networks to applications.


Guide - Cyber Security Trends

Cyber criminals have a varied and growing portfolio of techniques for gaining access to organisational resources and for obtaining control of systems.

This year, in an effort to drive awareness of cyber risks, we’ve created this short guide to explain the latest findings in cyber security. Download it to learn about key threats, leading causes of data leakage and more.


Guide - A guide for selling penetration tests to the board

Penetration testing produces management reports describing the state of your information security measures. These can be used to demonstrate that your IT spending is appropriate and cost-effective, or that further investment is necessary.

In this guide, we’ve listed 20 compelling reasons frequent penetration tests and vulnerability assessments are crucial.


Infographic - Is your website about to be hacked?

Web applications often process and/or store sensitive information including personally identifiable information, cardholder data and proprietary data. They connect with the corporate infrastructure and can communicate freely with the corporate Cloud at the point that users grant access through open authentication.

This infographic describes the application dilemma and offers suggestions for helping to answer the threat.


Infographic - Are your employees resistant to phishing attacks?

As phishing attacks increase in frequency and sophistication, it is critically important that end users and businesses learn to identify them and how to react when they are being targeted.

To do our part in spreading cyber security awareness, we’ve created an infographic covering phishing attacks and what users can do to protect themselves against this common online threat.


Infographic - What is ransomware and how can I protect my business?

The prevalence and reach of ransomware was emphasised when WannaCry spread rapidly across 200,000 organisations in 150 countries, including the UK’s National Health Service, Telefónica in Spain, and Nissan’s Sunderland plant, among many others.

This shareable infographic provides a quick guide to ransomware – what it is, how it works, what happens when your system is infected and what you can do to stop it.


Green paper - Penetration testing and ISO 27001

Penetration testing is an essential component of any ISO 27001 information security management system (ISMS), from initial development through to ongoing maintenance and continual improvement.

This free green paper describes how penetration testing fits into an ISO 27001 ISMS project.


Speak to an expert

Please contact us for further information or to speak to an expert.

Contact us