Risk Assessments – A Cats Tale

Risk Assessments, Cat Flaps and Ransomware One of the most common activities undertaken as a Security Consultant at Nexor is talking to clients about risk management and risk assessments.  There are many different methodologies that can be used to determine risk, but...

High Assurance Cyber Security

What is High Assurance? As computer security systems have evolved over the years, hackers have become more sophisticated. Their methods have changed, targeting any vulnerabilities to try and find a way into a system. No business is immune from cyber attacks,...

Getting the Cyber Security Basics Right

Back to the basics with Cyber Essentials Four years is a long time in cyber security; a lot can change in that time. But surprisingly, a lot also stays the same. Back in 2016, the National Cyber Security Centre released a white paper on Common Cyber Attacks: Reducing...

Does SolarWinds Mean Cyber Essentials is Dead?

The King is Dead, Long Live the King! For the last few years, the cyber security commentary has been if you focus on the basics, and do the basics well, you will prevent 90% plus of cyber security attacks. To many this has been interpreted as doing the “Cyber...

Christmas Card Competition 2020

As 2020 draws to a close, we would like to send our Season’s Greetings and wish a very Happy New Year to all our customers. This year has turned out very different to how we all imagined it and there have been massive changes in the way we work. To bring some fun and...

A day in the life of a CISO

What does a CISO at an SME do during their working day? A CISO – Chief Information Security Officer – at an SME is responsible for security operations, securing the business, its technology, and its initiatives, and leading the business’s information security...

Zero Trust – It’s An Architectural State of Mind

What Is Zero Trust? The term ‘Zero Trust’ was first coined by John Kindervag in 2010, building off a concept put forward by David Lacey at the Jericho Forum, an international group founded in 2004 that worked to promote deperimeterization. Deperimeterization means to...

What Is A Cyber Threat Actor?

You may see the term ‘threat actor’ within risk assessments or other articles – but what is a threat actor? Threat actors are people or entities who are responsible for an incident that impacts the cyber security of another person or organisation. Cyber threat...

Office 365 Security & Compliance

  So, you have moved to Office 365. I can imagine that your IT department is rejoicing the fact they will never again have to run ESEUTIL, especially at 2am on a corrupt exchange database – it’s an experience nobody wants. Office 365 offers a secure,...