Connected Autonomous Vehicles – Securing the Future

The average car manufactured today contains over 100 million lines of code. This represents a huge data surface which threat actors can attack to alter a component’s behaviour from its originally intended function. On top of this, new security implications will arise...

What is 2FA and is it really secure?

The Issue of Phishing Attacks 90% of security attacks start with a phishing attempt. This is because attackers want to get hold of your password. Once they have obtained this, they can become you, and access wherever you can access. Passwords work as a “share secret”...

It Won’t Happen To Us

When talking to board members and senior executives of SMEs about cyber security, a common phrase we hear is “It won’t happen to us”. This is justified by “We are not sufficiently important”, or “We don’t have anything they would want”. “Well, it did”, Ian Major of...

Does Resilience Reflect your Risk?

Business continuity refers to the activities required to keep an organisation safe and running during an unprecedented event that interrupts normal service. Within the first 3 months of 2020 we have already experienced 2 very real and impactful threats to businesses....

How to Manage a Homebound Workforce

With the introduction of social distancing and uncertainty over what the future holds, businesses are looking to change the way we work more drastically than ever before. However, there is a historical precedent, 355 years ago in 1665, an outbreak of bubonic plague,...

Our New Values & the Future for Nexor

2019 marked Nexor’s 30th year of business, and to commemorate this landmark achievement all employees were treated to a day out at the birthplace of computing. Fun and games aside, management had more in the pipeline to spice up the years to come. For the last 6 years...