Cloud Security for SMEs
I often see postings, or hear discussions asking if the cloud is sufficiently secure for SMEs. Like any good consultant, the appropriate answer is it depends – or does it? Earlier this year I had the...
View ArticleDo you deploy 2 percent of your staff on Network Security?
In the blog article “Why don’t organisations adopt cyber security measures?” the Tony Dyhouse observes A key finding in the report refers to the current practice of lumping together any company with...
View ArticleBelieving in Boogeymen
It seems fairly accepted these days that businesses are not doing enough in the area of Cyber Security. Progress is being made to an extent, but mostly this seems to be in businesses that are bigger...
View ArticleHBR: National Cyber Security Progress – UK Perspective
A recent article in Harvard Business Review, made an analysis of the US Cyber Security status and suggested “Here are four things that the private sector — and I mean CEOs, not CTOs — should be loudly...
View ArticleBye Bye Barney
Nexor are now nicely at home in our new offices; a sad part of this is we have to say goodbye to Barney. Prior to moving to a cloud and virtualised infrastructure, we had a large (for an SME) server...
View ArticleSimple Information Assurance Maturity Model
A few months back I was tasked by the Nexor Board to carry out a fresh review of the cyber threat to our business and the maturity of our risk mitigations. We’ve had ISO 27001 for a many years across...
View ArticleReaction to BIS Cyber Security Standard
Making an organisation cyber-secure is difficult. As a supplier, demonstrating to an external customer that you are cyber-secure is even more difficult. Conversely, as a customer how can you tell which...
View ArticleIISP East Midlands: BIS Organisational Standards
On January 29, we held the second IISP meeting in the East Midlands, at the Institute of Directors in Nottingham, attended by close to 30 delegates. The meeting was opened by Colin Powers with an...
View ArticleBooting Linux Securely
A report from Learning Tree “Linux Scores Highest in UK Government Security Assessment” has analysed the CESG set of reports on the security of end user devices, in which CESG assessed 11 operating...
View ArticleTrustworthy Communications
Each day we become more reliant on the Internet in both our personal and business lives, yet each day there are new stories of security failures. A key part of living and working on the Internet is...
View ArticleUK Government Security Classification Scheme
After nearly two years of planning, the new UK Government Security Classification system comes into operation this month. This will probably be accompanied by some articles from the doomsday brigade...
View ArticleThe Cyber Essentials Experience
This month the UK Government Cyber Essentials Scheme was launched. Nexor committed to gaining Cyber Essentials certification, with Steve Kingan observing: “I welcome the advent of the Cyber Essentials...
View Article5 Observations on Moving the Cyber Industry Forward
I had the pleasure of attending the SINET Global Cybersecurity Innovation Summit earlier this week. A very thought provoking event, with some great speakers. The closing Keynote was provided by Sir...
View ArticleWhy have I got an Intruder Alarm?
At home, I have invested in good quality locks on my doors and windows, conforming to the standard required by my insurance company. In addition to that I have also invested in an intruder alarm. This...
View ArticleCloud Security for SMEs
I often see postings, or hear discussions asking if the cloud is sufficiently secure for SMEs. Like any good consultant, the appropriate answer is it depends – or does it? Earlier this year I had the...
View Article
More Pages to Explore .....