Our News

Read the latest news from Nexor

Keep up to date with all the latest press releases from Nexor. For all media enquiries please email us.

Content, Disarm & Reconstruction

Content, Disarm & Reconstruction

What is Content, Disarm and Reconstruction?  Content, Disarm and Reconstruction (CDR) is the act of scanning and removing potentially malicious code from files. It is most often used within your email inbox, to ensure that any files you receive are safe to open. This...

New Cyber Feasibility Report

New Cyber Feasibility Report

This week the CAVShield consortium announced the publication of the project’s reports into the feasibility of detecting and mitigating vulnerabilities and threats to networks of Connected and Automated Vehicles (CAVs). Jointly funded with industry through Zenzic’s...

It Won’t Happen To Us

It Won’t Happen To Us

When talking to board members and senior executives of SMEs about cyber security, a common phrase we hear is “It won’t happen to us”. This is justified by “We are not sufficiently important”, or “We don’t have anything they would want”. “Well, it did”, Ian Major of...

Does Resilience Reflect your Risk?

Does Resilience Reflect your Risk?

Business continuity refers to the activities required to keep an organisation safe and running during an unprecedented event that interrupts normal service. Within the first 3 months of 2020 we have already experienced 2 very real and impactful threats to businesses....

How to Manage a Homebound Workforce

How to Manage a Homebound Workforce

With the introduction of social distancing and uncertainty over what the future holds, businesses are looking to change the way we work more drastically than ever before. However, there is a historical precedent, 355 years ago in 1665, an outbreak of bubonic plague,...

Our New Values & the Future for Nexor

Our New Values & the Future for Nexor

2019 marked Nexor’s 30th year of business, and to commemorate this landmark achievement all employees were treated to a day out at the birthplace of computing. Fun and games aside, management had more in the pipeline to spice up the years to come. For the last 6 years...

Cyber Security Careers at Nexor

Cyber Security Careers at Nexor

With so many options and unknowns, choosing or changing your career is always a daunting life decision. To help those who might be interested in a career in Cyber Security take that step, we asked our experts here at Nexor about their experiences in the industry. This...

Seasons Greetings & A Happy New Year

Seasons Greetings & A Happy New Year

As 2019 draws to a close, we would like to send our Season's Greetings and wish a very Happy New Year to all of our customers who have helped make this such a good year for Nexor. This year we have a virtual Christmas card, in lieu of sending out postal cards and we...

Financial Services Webinar – Sarah Knowles

Financial Services Webinar – Sarah Knowles

Sarah delivered a webinar to Practice Managers and Operations Directors who are members of the Master Practitioners Club. The webinar was a discussion about cyber security for the financial services industry and the key threats to businesses.  About Sarah Sarah is our...

The Rise of Supply Chain Cyber Attacks

The Rise of Supply Chain Cyber Attacks

What is a Supply Chain Cyber Attack? You don’t need to look very far in today’s headlines without seeing a report on the latest cyber attack or data breach. These attacks are almost accepted as a risk of running a business. What you might not be aware of is that many...

RECENT BLOG POSTS

Incident Response Plans

Security incidents can and will take place within your business, putting employees and the wider business under a great deal of pressure. Making sound decisions to minimise the impact of the event can be difficult. These incidents can also be costly in terms of...

Cloud Computing Security Risks

And how to mitigate them   Cloud security is a big topic. The Cloud is not just one thing, but a concept that comes in many different forms. Each form has its own security intricacies that need to be dealt with. No matter which aspects you look at, Cloud...

Connected Autonomous Vehicles – Securing the Future

The average car manufactured today contains over 100 million lines of code. This represents a huge data surface which threat actors can attack to alter a component’s behaviour from its originally intended function. On top of this, new security implications will arise...

Subscribe to our RSS feeds

 Archives

Be the first to know about developments in secure information exchange