Supply Chain Risk Management

Supply chain risk management, sometimes referred to as Third Party Risk Management (TPRM), is an essential part of any business. The vast majority of businesses will have some form of reliance on a supplier to provide a service.   Not all suppliers are created...

Insight into the Murky World of Cybercrime

On Wednesday 22nd July, Colin Robbins of Nexor, hosted a virtual Masterclass on behalf of the Nottingham, Derby, Leicester Branch of the Chartered Institute of Information Security Professionals on an “Insight into the Murky World of Cybercrime”. The event was well...

Incident Response Plans

Security incidents can and will take place within your business, putting employees and the wider business under a great deal of pressure. Making sound decisions to minimise the impact of the event can be difficult. These incidents can also be costly in terms of...

Cloud Computing Security Risks

And how to mitigate them   Cloud security is a big topic. The Cloud is not just one thing, but a concept that comes in many different forms. Each form has its own security intricacies that need to be dealt with. No matter which aspects you look at, Cloud...

Content, Disarm & Reconstruction

What is Content, Disarm and Reconstruction?  Content, Disarm and Reconstruction (CDR) is the act of scanning and removing potentially malicious code from files. It is most often used within your email inbox, to ensure that any files you receive are safe to open. This...

Connected Autonomous Vehicles – Securing the Future

The average car manufactured today contains over 100 million lines of code. This represents a huge data surface which threat actors can attack to alter a component’s behaviour from its originally intended function. On top of this, new security implications will arise...

New Cyber Feasibility Report

This week the CAVShield consortium announced the publication of the project’s reports into the feasibility of detecting and mitigating vulnerabilities and threats to networks of Connected and Automated Vehicles (CAVs). Jointly funded with industry through Zenzic’s...

What is 2FA and is it really secure?

​The Issue of Phishing Attacks 90% of security attacks start with a phishing attempt. This is because attackers want to get hold of your password. Once they have obtained this, they can become you, and access wherever you can access. Passwords work as a “share secret”...

It Won’t Happen To Us

When talking to board members and senior executives of SMEs about cyber security, a common phrase we hear is “It won’t happen to us”. This is justified by “We are not sufficiently important”, or “We don’t have anything they would want”. “Well, it did”, Ian Major of...

Does Resilience Reflect your Risk?

Business continuity refers to the activities required to keep an organisation safe and running during an unprecedented event that interrupts normal service. Within the first 3 months of 2020 we have already experienced 2 very real and impactful threats to businesses....