by Sarah Knowles | Jan 27, 2021
Risk Assessments, Cat Flaps and Ransomware One of the most common activities undertaken as a Security Consultant at Nexor is talking to clients about risk management and risk assessments. There are many different methodologies that can be used to determine risk, but...
by Colin Robbins | Jan 20, 2021
The Risks of Cyber Cat Flaps So here we are in January 2021, and the significant hacks are already being reported, picking up where 2020 left off. While the cyber industry is still managing the fallout of SolarWinds, Google has announced (with few details of the...
by Colin Robbins | Jan 13, 2021
What is High Assurance? As computer security systems have evolved over the years, hackers have become more sophisticated. Their methods have changed, targeting any vulnerabilities to try and find a way into a system. No business is immune from cyber attacks,...
by Sarah Knowles | Jan 12, 2021
Back to the basics with Cyber Essentials Four years is a long time in cyber security; a lot can change in that time. But surprisingly, a lot also stays the same. Back in 2016, the National Cyber Security Centre released a white paper on Common Cyber Attacks: Reducing...
by Colin Robbins | Jan 6, 2021
The King is Dead, Long Live the King! For the last few years, the cyber security commentary has been if you focus on the basics, and do the basics well, you will prevent 90% plus of cyber security attacks. To many this has been interpreted as doing the “Cyber...
by Colin Robbins | Dec 8, 2020
What does a CISO at an SME do during their working day? A CISO – Chief Information Security Officer – at an SME is responsible for security operations, securing the business, its technology, and its initiatives, and leading the business’s information security...
by Colin Robbins | Nov 25, 2020
What Is Zero Trust? The term ‘Zero Trust’ was first coined by John Kindervag in 2010, building off a concept put forward by David Lacey at the Jericho Forum, an international group founded in 2004 that worked to promote deperimeterization. Deperimeterization means to...
by Sarah Knowles | Nov 16, 2020
You may see the term ‘threat actor’ within risk assessments or other articles – but what is a threat actor? Threat actors are people or entities who are responsible for an incident that impacts the cyber security of another person or organisation. Cyber threat...