Using the Toyota Approach to Building Trustworthy Products

Toyota has gained a reputation worldwide for consistently producing high-quality vehicles. This reputation has been built through a dedicated approach to quality control and assurance. Toyota’s founder, Sakichi Toyoda, once said: “a product should never be sold until...

What Is A Security Audit?

Implementing effective cyber security involves a lot more than just applying the latest technology. You need to enact appropriate supporting policies/processes and ensure your staff are effectively trained  to follow them. These factors taken together are what is...

Cyber Essentials – Where To Begin?

What Is Cyber Essentials? Cyber Essentials is a government-backed scheme, operated by the National Cyber Security Centre. The scheme highlights the baseline of good security practice and helps to teach businesses how to protect themselves from online threats. There...

The benefits of being a ‘cyber ready’ business

Cyber-readiness is becoming an increasingly important quality for organisations of all descriptions to aim for. A recent report from Vodafone Business highlights the room for improvement that still exists for the majority of companies worldwide. Nexor contributed...

Nexor releases Sentinel 3.60

Nexor releases sentinel 3.60 October 2018 Sentinel 3.60 is the latest version of Nexor’s high assurance email guard. The newest version incorporates a number of updates designed to make the tool more secure and functional. We have enhanced and added features to...

Magecart attacks – can your business stay secure?

Magecart attacks – can your business stay secure? September 2018 Is it possible to keep hackers like Magecart at bay? At least three major businesses have been compromised in a spate of cyber attacks over the past few months. As many as 800 other ecommerce...

The 14 cloud security principles – what do they mean for you?

The 14 cloud security principles – what do they mean for you? The NCSC (National Cyber Security Centre) published 14 cloud security principles in 2016. These principles are designed to give guidance to cloud service providers in order to protect their customers....

Dynamic Risk Management – The Path Less Trodden…

Dynamic Risk Management – The Path Less Trodden… March 2018 Traditionally, our approach to managing cyber security risks has been ‘static’ – in the sense that the threat analysis, risk assessment and treatment plan are performed as manual operations ‘up front’ of...