Our News
Read the latest news from Nexor
Keep up to date with all the latest press releases from Nexor. For all media enquiries please email us.
Safe File Transfers & the Reserve Bank of New Zealand Cyber Attack
The Risks of Cyber Cat Flaps So here we are in January 2021, and the significant hacks are already being reported, picking up where 2020 left off. While the cyber industry is still managing the fallout of SolarWinds, Google has announced (with few details of the...
How Covid-19 infected Information Security
On Monday 19th October CIISec Nottingham, Derby, Leicester Branch collaborated with BCS Nottingham Derby to host a virtual event, “How Covid-19 infected Information Security”. The event was well attended by 64 security professionals from both organisations. Prior to...
GuarDiode 3.0 Press Release
Nexor is pleased to announce GuarDiode 3.0, the latest version of our high assurance information exchange product is now commercially available. Nexor GuarDiode solutions enables our customers to create enforced one-way network connections between systems at the...
Cyber Security Is For Life, Not Just October
October marks European Cybersecurity Month (ECSM) and National Cyber Security Awareness Month (NCSAM). It can serve as a valuable reminder for organisations to evaluate their position in relation to Cyber Security. This blog begins a series of key topics and takeaways...
Insight into the Murky World of Cybercrime
On Wednesday 22nd July, Colin Robbins of Nexor, hosted a virtual Masterclass on behalf of the Nottingham, Derby, Leicester Branch of the Chartered Institute of Information Security Professionals on an “Insight into the Murky World of Cybercrime”. The event was well...
Content, Disarm & Reconstruction
What is Content, Disarm and Reconstruction? Content, Disarm and Reconstruction (CDR) is the act of scanning and removing potentially malicious code from files. It is most often used within your email inbox, to ensure that any files you receive are safe to open. This...
New Cyber Feasibility Report
This week the CAVShield consortium announced the publication of the project’s reports into the feasibility of detecting and mitigating vulnerabilities and threats to networks of Connected and Automated Vehicles (CAVs). Jointly funded with industry through Zenzic’s...
It Won’t Happen To Us
When talking to board members and senior executives of SMEs about cyber security, a common phrase we hear is “It won’t happen to us”. This is justified by “We are not sufficiently important”, or “We don’t have anything they would want”. “Well, it did”, Ian Major of...
Does Resilience Reflect your Risk?
Business continuity refers to the activities required to keep an organisation safe and running during an unprecedented event that interrupts normal service. Within the first 3 months of 2020 we have already experienced 2 very real and impactful threats to businesses....
How to Manage a Homebound Workforce
With the introduction of social distancing and uncertainty over what the future holds, businesses are looking to change the way we work more drastically than ever before. However, there is a historical precedent, 355 years ago in 1665, an outbreak of bubonic plague,...
RECENT BLOG POSTS
High Assurance Cyber Security
What is High Assurance? As computer security systems have evolved over the years, hackers have become more sophisticated. Their methods have changed, targeting any vulnerabilities to try and find a way into a system. No business is immune from cyber attacks,...
Getting the Cyber Security Basics Right
Back to the basics with Cyber Essentials Four years is a long time in cyber security; a lot can change in that time. But surprisingly, a lot also stays the same. Back in 2016, the National Cyber Security Centre released a white paper on Common Cyber Attacks: Reducing...
Does SolarWinds Mean Cyber Essentials is Dead?
The King is Dead, Long Live the King! For the last few years, the cyber security commentary has been if you focus on the basics, and do the basics well, you will prevent 90% plus of cyber security attacks. To many this has been interpreted as doing the “Cyber...
Be the first to know about developments in secure information exchange