Zero Trust – It’s An Architectural State of Mind

What Is Zero Trust? The term ‘Zero Trust’ was first coined by John Kindervag in 2010, building off a concept put forward by David Lacey at the Jericho Forum, an international group founded in 2004 that worked to promote deperimeterization. Deperimeterization means to...

What Is A Cyber Threat Actor?

You may see the term ‘threat actor’ within risk assessments or other articles – but what is a threat actor? Threat actors are people or entities who are responsible for an incident that impacts the cyber security of another person or organisation. Cyber threat...

Office 365 Security & Compliance

  So, you have moved to Office 365. I can imagine that your IT department is rejoicing the fact they will never again have to run ESEUTIL, especially at 2am on a corrupt exchange database – it’s an experience nobody wants. Office 365 offers a secure,...

How Covid-19 infected Information Security

On Monday 19th October CIISec Nottingham, Derby, Leicester Branch collaborated with BCS Nottingham Derby to host a virtual event, “How Covid-19 infected Information Security”. The event was well attended by 64 security professionals from both organisations. Prior to...

How to protect against ransomware

Don’t be held to ransom Our final blog in the series for National Cyber Security Awareness Month focuses on the human factors within Cyber Security covering ransomware and incident management and response. Cyber-attacks are on the increase with threat actors...

GuarDiode 3.0 Press Release

Nexor is pleased to announce GuarDiode 3.0, the latest version of our high assurance information exchange product is now commercially available. Nexor GuarDiode solutions enables our customers to create enforced one-way network connections between systems at the...

How to prevent phishing & keep your employees off the hook

Keep your employees off the hook Following on in our series for European Cybersecurity Month (ECSM) and National Cyber Security Awareness Month (NCSAM) this blog will explore the topic of how to prevent phishing and the impact individuals working in our organisations...

Cyber Security Is For Life, Not Just October

October marks European Cybersecurity Month (ECSM) and National Cyber Security Awareness Month (NCSAM). It can serve as a valuable reminder for organisations to evaluate their position in relation to Cyber Security. This blog begins a series of key topics and takeaways...

Supply Chain Risk Management

Supply chain risk management, sometimes referred to as Third Party Risk Management (TPRM), is an essential part of any business. The vast majority of businesses will have some form of reliance on a supplier to provide a service.   Not all suppliers are created...