This website uses cookies. View our cookie policy
Select regional store:

  Penetration testing resources

Download a range of different resources such as guides, datasheets, infographics and green papers providing technical guidance to help support your penetration testing program.


Webinar – Cyber security: protecting your business with cost-effective penetration testing

Our penetration testing experts share practical insights about implementing a penetration testing program. Designed to inform information security professionals, this webinar will help you to conduct effective, value-for-money penetration testing as part of a technical security assurance framework.


Webinar: How can penetration testing support your GDPR project?

Learn more about how penetration testing can help you with General Data Protection Regulation (GDPR) compliance by watching our free webinar. ‘How can penetration testing support your GDPR project?’ is hosted by IT Governance’s founder and executive chairman, Alan Calder, and head of technical services, David Grove, and explains how penetration testing can help organizations comply with the GDPR.


White paper - Assured Security: Getting cyber secure with penetration testing

Most organisations are the target of random, indiscriminate attacks, and they need an appropriate level of penetration testing to ensure their defences are adequate. But while many organisations know they need penetration testing, it can be hard to know how to fit them in to a larger security programme, or even how to get started.

Our white paper, "Assured Security: Getting cyber secure with penetration testing", provides a clear introduction to best-practice penetration testing.


Data sheet - Are your critical assets safe from hackers?

A penetration test identifies the vulnerabilities that leave your infrastructure and applications exposed, and gives you the information you need to close any gaps in your security.

Learn how IT Governance approaches a penetration test and how our penetration testing services can strengthen your security posture.


Case study – Collinson Group

Collinson Group is a rapidly evolving organisation that operates a diverse set of market-leading technologies. It needs its systems to be secure and dependable, but it had no way of knowing whether its defences provide adequate protection. Penetration testing provides that information.

Download the case study to find out how penetration testing helped Collinson Group test its ability to protect its applications.


Infographic - What is a penetration test and why would my company need one?

Hacking is not the preserve of master cyber criminals. Unskilled computer users can easily download and run hacking software designed to search for, find and exploit known vulnerabilities wherever they occur.

This infographic gathers the latest facts and figures on cyber attacks and hacking, and offers reasons organisations should test the security of their IT infrastructure – from networks to applications.


Infographic - Is your web app under attack?

Web applications often process and/or store sensitive information including personally identifiable information, cardholder data and proprietary data. They connect with the corporate infrastructure and can communicate freely with the corporate Cloud at the point that users grant access through open authentication.

This infographic describes the application dilemma and offers suggestions for helping to answer the threat.


Infographic - Is your network under attack?

Network penetration tests focus on the organisation’s boundaries – how it connects with the Internet and other external systems. If the interfaces are not designed correctly, this creates a perfect loophole for hackers to enter a network.

This infographic describes the risks posed to the network from both internal and external threats.


Infographic - Is your Wi-Fi under attack?

Wireless capabilities can provide opportunities for attackers to infiltrate an organisation’s secured environment – irrespective of security access controls. Pen testing can help validate weaknesses in the wireless infrastructure.

This infographic describes the common types of Wi-Fi attack and how penetration testing can help to validate weaknesses.


Infographic - Are your employees resistant to phishing attacks?

As phishing attacks increase in frequency and sophistication, it is critically important that end users and businesses learn to identify them and how to react when they are being targeted.

To do our part in spreading cyber security awareness, we’ve created an infographic covering phishing attacks and what users can do to protect themselves against this common online threat.


Infographic - What is ransomware and how can I protect my business?

The prevalence and reach of ransomware was emphasised when WannaCry spread rapidly across 200,000 organisations in 150 countries, including the UK’s National Health Service, Telefónica in Spain, and Nissan’s Sunderland plant, among many others.

This shareable infographic provides a quick guide to ransomware – what it is, how it works, what happens when your system is infected and what you can do to stop it.


Penetration testing and the GDPR

Article 32 of the Regulation requires organisations to implement technical measures to ensure data security. For GDPR compliance, penetration tests are crucial because they provide a final, end-of-state check to make sure all the security controls required have been implemented correctly. They can also be used in the early stages of developing new processing systems to identify potential risks to personal data.

Download this green paper for practical guidance on how to conduct a penetration test that supports GDPR compliance.


Green paper - Penetration testing and ISO 27001

Penetration testing is an essential component of any ISO 27001 information security management system (ISMS), from initial development through to ongoing maintenance and continual improvement.

This free green paper describes how penetration testing fits into an ISO 27001 ISMS project.


Speak to an expert

Please contact us for further information or to speak to an expert.