by Sarah Knowles | Sep 2, 2020
Supply chain risk management, sometimes referred to as Third Party Risk Management (TPRM), is an essential part of any business. The vast majority of businesses will have some form of reliance on a supplier to provide a service. Not all suppliers are created...
by Dawn O'Connor | Aug 6, 2020
On Wednesday 22nd July, Colin Robbins of Nexor, hosted a virtual Masterclass on behalf of the Nottingham, Derby, Leicester Branch of the Chartered Institute of Information Security Professionals on an “Insight into the Murky World of Cybercrime”. The event was well...
by Chris Gent | Jul 28, 2020
Security incidents can and will take place within your business, putting employees and the wider business under a great deal of pressure. Making sound decisions to minimise the impact of the event can be difficult. These incidents can also be costly in terms of...
by Colin Robbins | Jul 23, 2020
And how to mitigate them Cloud security is a big topic. The Cloud is not just one thing, but a concept that comes in many different forms. Each form has its own security intricacies that need to be dealt with. No matter which aspects you look at, Cloud...
by Natalie Wilding | Jun 19, 2020
What is Content, Disarm and Reconstruction? Content, Disarm and Reconstruction (CDR) is the act of scanning and removing potentially malicious code from files. It is most often used within your email inbox, to ensure that any files you receive are safe to open. This...
by Colin Robbins | May 19, 2020
The average car manufactured today contains over 100 million lines of code. This represents a huge data surface which threat actors can attack to alter a component’s behaviour from its originally intended function. On top of this, new security implications will arise...
by Colin Robbins | May 12, 2020
The Issue of Phishing Attacks 90% of security attacks start with a phishing attempt. This is because attackers want to get hold of your password. Once they have obtained this, they can become you, and access wherever you can access. Passwords work as a “share secret”...
by Colin Robbins | Apr 2, 2020
When talking to board members and senior executives of SMEs about cyber security, a common phrase we hear is “It won’t happen to us”. This is justified by “We are not sufficiently important”, or “We don’t have anything they would want”. “Well, it did”, Ian Major of...
by Dawn O'Connor | Mar 31, 2020
Business continuity refers to the activities required to keep an organisation safe and running during an unprecedented event that interrupts normal service. Within the first 3 months of 2020 we have already experienced 2 very real and impactful threats to businesses....