Tag Archives: SME

Why have I got an Intruder Alarm?

28 Oct

At home, I have invested in good quality locks on my doors and windows, conforming to the standard required by my insurance company. In addition to that I have also invested in an intruder alarm.

Continue reading

5 Observations on Moving the Cyber Industry Forward

19 Sep

I had the pleasure of attending the SINET Global Cybersecurity Innovation Summit earlier this week. A very thought provoking event, with some great speakers.
Continue reading

The Cyber Essentials Experience

12 Jun

This month the UK Government Cyber Essentials Scheme was launched.

Nexor committed to gaining Cyber Essentials certification, with Steve Kingan observing:

“I welcome the advent of the Cyber Essentials Scheme and believe it is an important development in improving the supply chain to HMG. Nexor has demonstrated that the Scheme can be straight forward to implement even for an SME. I am pleased that this new mark will become a mandated accreditation for all HMG suppliers of sensitive information technology procurements; and delighted that Nexor has been involved from the start of the Scheme.”

Continue reading

UK Government Security Classification Scheme

1 Apr

After nearly two years of planning, the new UK Government Security Classification system comes into operation this month. This will probably be accompanied by some articles from the doomsday brigade suggesting forecasting chaos and uncertainty; there are undoubtedly rough edges, but it’s important not to lose sight of the bigger cultural change at play…

Continue reading

Trustworthy Communications

25 Mar

Each day we become more reliant on the Internet in both our personal and business lives, yet each day there are new stories of security failures.   A key part of living and working on the Internet is the ability to be able to communicate securely; whether inter-personal communication, such as email or chat, or client / server communication to access a web site.

This blog looks at how and why secure communications fail, and what we can do about it.

Continue reading

Booting Linux Securely

6 Feb

A report from Learning Tree “Linux Scores Highest in UK Government Security Assessment” has analysed the CESG set of reports on the security of end user devices, in which CESG assessed 11 operating systems. The Learning Tree report observed:

Of those, Linux got the best overall score

The report then looked at the criteria used to make this assess, and suggested:

As for Secure Boot, that has its serious detractors

Continue reading

IISP East Midlands: BIS Organisational Standards

1 Feb

On January 29, we held the second IISP meeting in the East Midlands, at the Institute of Directors in Nottingham, attended by close to 30 delegates.
The meeting was opened by Colin Powers with an introduction and explanation that some quick reshuffling of the agenda was in order as the main speakers train was running late. He also published the hash-tag #IISPEastMids, with delegates encouraged share their thoughts on the meeting live via twitter (these tweets are available as an archive).
Continue reading

Reaction to BIS Cyber Security Standard

28 Nov

Making an organisation cyber-secure is difficult. As a supplier, demonstrating to an external customer that you are cyber-secure is even more difficult. Conversely, as a customer how can you tell which organisations take it seriously?
Continue reading

Simple Information Assurance Maturity Model

22 Oct

A few months back I was tasked by the Nexor Board to carry out a fresh review of the cyber threat to our business and the maturity of our risk mitigations. We’ve had ISO 27001 for a many years across the business, and our audits all come up good, so I thought it should be easy. But how could I explain the results in a Board friendly manner?

Continue reading

Bye Bye Barney

2 Oct

Nexor are now nicely at home in our new offices; a sad part of this is we have to say goodbye to Barney.

Continue reading