Cyber Business ​Blog

7Safe's trusted cyber security experts share insights in this blog to help business executives understand, keep up-to-date and manage cyber security risks.

select
  • Bitcoin Mining / Crytojacking

    CYBER BITESIZE - Threat #4: Bitcoin Mining / Cryptojacking

    Jun 19, 2018

    Bitcoin mining is a difficult subject. PA and 7Safe's Michael Shuff gives you the facts in straight terms.
  • Cyber Worm

    CYBER BITESIZE - Threat #3: Worms

    Apr 30, 2018

    PA & 7Safe's Michael Shuff examines a few recent cyber worms and asks why they are making a comeback?
  • IoT WiFi Kettle

    Securing IoT Devices by Design: the Roadmap that avoids Assumptions

    Apr 17, 2018

    David Alexander of PA Consulting highlights a few dangerous assumptions in most IoT Roadmaps.
  • Trojan

    CYBER BITESIZE - Threat #2: Trojans

    Apr 12, 2018

    In the second article in the series, CYBER BITESIZE, PA & 7Safe's Michael Shuff defines Trojans.
  • The information security blame game

    The Cyber Security Blame Game

    Apr 11, 2018

    Can organisations outsource responsibility for cyber breaches? PA & 7Safe cyber expert and PCI QSA, Stephen Hancock, says no.
  • Ransomware

    CYBER BITESIZE - Threat #1: Ransomware

    Apr 10, 2018

    In the first of a series of Cyber Bitsize articles, PA & 7Safe's Michael Shuff defines cyber threats and the risks they pose.
  • UK_Cybersecurity_Breaches_Report

    Is your business too complacent about cyber security?

    May 04, 2017

    The results are in. Britain’s businesses need to get better at protecting themselves from cyber criminals. The UK’s Department for Culture, Media and Sport’s annual Cyber Security Breaches Survey seeks to uncover business attitudes toward cyber security and the nature and impact of breaches. So what picture emerges when we focus on medium and large businesses?
  • Ransomware threat triggers interest in CSIR at IP EXP 2016

    CSIR triggers interest at IP EXPO

    Oct 25, 2016

    Cyber Security Incident Response services + training were what IT Pros asked for at IP EXPO. Is CSIR the next Cyber buzzword?
  • Password panic

    NIST advice: Don’t use SMS for 2FA

    Aug 24, 2016

    NIST's new guidance on password management contains some surprising advice.
  • PCI DSS Sailing through rocky waters

    PCI DSS v3.2 – Rocks under the water?

    Jul 22, 2016

    PCI DSS 3.2 is not news, but how many organisations really know the waters they are navigating and the hazards beneath the surface?