Only the socks with high-end power packs have Bluetooth, to connect to the app for smart functionality. The power pack was ...
Access cards can be cloned There are practical measures to make card cloning difficult Practical guidance on how these systems work and why you should make sure they’re configured right What is a ...
When a breach happens, it’s not just technical defences that matter. Preparation in non-technical areas, like having key documents printed or emergency contacts accessible, can make all the difference ...
“Everyone has a plan until they get punched in the face.” This Mike Tyson boxing quote perfectly encapsulates the chaos of a cybersecurity breach. Accept that you will get punched in the face Train ...
Connected embedded devices often contain many processors. Alongside the main application processor it is common to find other sub-systems: A secondary microcontroller providing lower level safety or ...
A red team engagement is an objective-based assessment that requires a holistic view of the organisation from the perspective of an adversary. This assessment process is designed to meet the needs of ...
We have talented testers for virtually any scenario, a bold claim but true nonetheless. We’ve provided a sample of the types of pen testing we conduct, it’s not exhaustive but gives a flavour of what ...
We are vendor neutral and platform agnostic. This means that you get unbiased testing and appraisal of any and every environment. We keep a very clear and level head too. We are not fazed by high ...
We’re only as good as the people in our team, so we’re always looking for great people. Maybe that’s you? PTP is acutely aware of the lack of diversity in our industry, and are keen to address that.
Your door access control system (aka a physical access control system or PACS), also referred to as RFID cards or ‘swipe’ cards often have a poor reputation for being vulnerable to cloning attacks.
The threat landscape has never been more challenging. Significant numbers of highly skilled and motivated threat actors present a real danger. They have many potential goals such as penetrating your ...