Cyber Business ​Blog

7Safe's trusted cyber security experts share insights in this blog to help business executives understand, keep up-to-date and manage cyber security risks.

  • EU General Data Protection Regulation (GDPR)

    EU Data Protection Regulation: Approval expected soon

    Jan 08, 2016

    Whilst two years seems a long time away, it really isn’t when you consider the scale of the changes that organisations will have to make to ensure they are compliant with the GDPR.
  • Smart_car_systems

    The Hacker’s New Toy: Smart Cars

    Aug 28, 2015

    Researchers are discovering worrying security holes in the technology that powers smart cars. Most of the time these vulnerabilities are the result of car makers simply not having the right expertise when it comes to securing computer systems from cyber criminals.
  • The Secret's out!

    Ashley Madison: Unencrypted data exposes millions to public scandal

    Aug 21, 2015

    Millions of Ashley Madison’s customers greeted the news of data appearing on the dark web with mixture of deep anxiety and anger as their family life and professional reputations were put at risk. But was Avid Life Media’s handling of highly-confidential personal data any worse than other companies that have grown rapidly in the global online services boom?
  • Insure by Design?

    Insecure By Design?

    Jul 31, 2015

    The pressure to be first in the market creates its own dangers. Every day we are flooded by information about the newest technological solutions which obviously are intended to make our life easier and our work more efficient. This includes small vendors that want to pop-up and shine for a minute in the crowded IT market, as well as the large players such as Microsoft or Google. Competition is high and it is very important for every company to be able to present from time to time something unique.
  • Depositphotos_1700044_xs

    Don’t get swept along with the vulnerability hype

    Jul 01, 2015

    There is a trend for new vulnerabilities to be announced with catchy names such as VENOM, FREAK, and BEAST, to name but a few. These are often accompanied by professionally developed websites, a logo and, in some cases, press briefings by the company or security researchers that have found the vulnerability.
  • training_passport_tmb-thumb

    UK firms at risk from attacks on crypto keys, digital certificates

    Jul 01, 2015

  • Emojis for passwords

    Emojis for passwords

    Jun 30, 2015

    During the last month, there has been much talk about how successful a system where the password is entirely replaced by emojis might be. The idea of replacing passwords with images or icons is not a new one, but came up again when the company “Intelligent Environments”, a financial software development company, introduced a passcode authentication system using emojis.
  • Have_you_been_hacked_20161017

    The rise of ethical hacking

    Jun 30, 2015

    7Safe’s Aleksander Gorkowienko, a penetration testing expert, is quoted in an article in Mobile Europe about the rise of ethical hacking. The article discusses whether ethical hacking by telecoms firms is the answer to testing and securing internet of things devices.
  • mobile security

    Mobile attacks: Should you be worried?

    Jun 22, 2015

  • ethical_hacking

    Learn from the Experts

    Jun 19, 2015

    PA Consulting, in association with the National Analyst Working Group (NAWG), surveyed 48 law enforcement organisations across the UK and discovered that the time spent on investigating cybercrime is expected to treble over the next three years; and yet only 30% believe that they have the skills and tools to do the job effectively.*