Insight into the Murky World of Cybercrime

On Wednesday 22nd July, Colin Robbins of Nexor, hosted a virtual Masterclass on behalf of the Nottingham, Derby, Leicester Branch of the Chartered Institute of Information Security Professionals on an “Insight into the Murky World of Cybercrime”. The event was well...

Content, Disarm & Reconstruction

What is Content, Disarm and Reconstruction?  Content, Disarm and Reconstruction (CDR) is the act of scanning and removing potentially malicious code from files. It is most often used within your email inbox, to ensure that any files you receive are safe to open. This...

New Cyber Feasibility Report

This week the CAVShield consortium announced the publication of the project’s reports into the feasibility of detecting and mitigating vulnerabilities and threats to networks of Connected and Automated Vehicles (CAVs). Jointly funded with industry through Zenzic’s...

It Won’t Happen To Us

When talking to board members and senior executives of SMEs about cyber security, a common phrase we hear is “It won’t happen to us”. This is justified by “We are not sufficiently important”, or “We don’t have anything they would want”. “Well, it did”, Ian Major of...

Does Resilience Reflect your Risk?

Business continuity refers to the activities required to keep an organisation safe and running during an unprecedented event that interrupts normal service. Within the first 3 months of 2020 we have already experienced 2 very real and impactful threats to businesses....

How to Manage a Homebound Workforce

With the introduction of social distancing and uncertainty over what the future holds, businesses are looking to change the way we work more drastically than ever before. However, there is a historical precedent, 355 years ago in 1665, an outbreak of bubonic plague,...