How Covid-19 infected Information Security

On Monday 19th October CIISec Nottingham, Derby, Leicester Branch collaborated with BCS Nottingham Derby to host a virtual event, “How Covid-19 infected Information Security”. The event was well attended by 64 security professionals from both organisations. Prior to...

How to protect against ransomware

Don’t be held to ransom Our final blog in the series for National Cyber Security Awareness Month focuses on the human factors within Cyber Security covering ransomware and incident management and response. Cyber-attacks are on the increase with threat actors...

GuarDiode 3.0 Press Release

Nexor is pleased to announce GuarDiode 3.0, the latest version of our high assurance information exchange product is now commercially available. Nexor GuarDiode solutions enables our customers to create enforced one-way network connections between systems at the...

How to prevent phishing & keep your employees off the hook

Keep your employees off the hook Following on in our series for European Cybersecurity Month (ECSM) and National Cyber Security Awareness Month (NCSAM) this blog will explore the topic of how to prevent phishing and the impact individuals working in our organisations...

Cyber Security Is For Life, Not Just October

October marks European Cybersecurity Month (ECSM) and National Cyber Security Awareness Month (NCSAM). It can serve as a valuable reminder for organisations to evaluate their position in relation to Cyber Security. This blog begins a series of key topics and takeaways...

Supply Chain Risk Management

Supply chain risk management, sometimes referred to as Third Party Risk Management (TPRM), is an essential part of any business. The vast majority of businesses will have some form of reliance on a supplier to provide a service.   Not all suppliers are created...

Insight into the Murky World of Cybercrime

On Wednesday 22nd July, Colin Robbins of Nexor, hosted a virtual Masterclass on behalf of the Nottingham, Derby, Leicester Branch of the Chartered Institute of Information Security Professionals on an “Insight into the Murky World of Cybercrime”. The event was well...

Incident Response Plans

Security incidents can and will take place within your business, putting employees and the wider business under a great deal of pressure. Making sound decisions to minimise the impact of the event can be difficult. These incidents can also be costly in terms of...

Cloud Computing Security Risks

And how to mitigate them   Cloud security is a big topic. The Cloud is not just one thing, but a concept that comes in many different forms. Each form has its own security intricacies that need to be dealt with. No matter which aspects you look at, Cloud...