Cyber Business ​Blog

7Safe's trusted cyber security experts share insights in this blog to help business executives understand, keep up-to-date and manage cyber security risks.

  • Mind The Gap2

    UK CIOs: Skills Gap is Cyber Risk

    Jul 18, 2016

    77% of CIOs will face ever-growing cyber threats in the next five years due to skills shortages. 7Safe’s Michael Shuff asks: Why can’t UK companies find the right staff?
  • Passcode-interface

    New year, same old bad passw0rds

    Jan 28, 2016

    It's early 2016, yet the fifth annual list of the 25 worst passwords (pulled from the millions of stolen passwords made public throughout 2015) released by SplashData...
  • EU General Data Protection Regulation (GDPR)

    EU Data Protection Regulation: Approval expected soon

    Jan 08, 2016

    Whilst two years seems a long time away, it really isn’t when you consider the scale of the changes that organisations will have to make to ensure they are compliant with the GDPR.
  • Smart_car_systems

    The Hacker’s New Toy: Smart Cars

    Aug 28, 2015

    Researchers are discovering worrying security holes in the technology that powers smart cars. Most of the time these vulnerabilities are the result of car makers simply not having the right expertise when it comes to securing computer systems from cyber criminals.
  • The Secret's out!

    Ashley Madison: Unencrypted data exposes millions to public scandal

    Aug 21, 2015

    Millions of Ashley Madison’s customers greeted the news of data appearing on the dark web with mixture of deep anxiety and anger as their family life and professional reputations were put at risk. But was Avid Life Media’s handling of highly-confidential personal data any worse than other companies that have grown rapidly in the global online services boom?
  • Insure by Design?

    Insecure By Design?

    Jul 31, 2015

    The pressure to be first in the market creates its own dangers. Every day we are flooded by information about the newest technological solutions which obviously are intended to make our life easier and our work more efficient. This includes small vendors that want to pop-up and shine for a minute in the crowded IT market, as well as the large players such as Microsoft or Google. Competition is high and it is very important for every company to be able to present from time to time something unique.
  • Depositphotos_1700044_xs

    Don’t get swept along with the vulnerability hype

    Jul 01, 2015

    There is a trend for new vulnerabilities to be announced with catchy names such as VENOM, FREAK, and BEAST, to name but a few. These are often accompanied by professionally developed websites, a logo and, in some cases, press briefings by the company or security researchers that have found the vulnerability.
  • training_passport_tmb-thumb

    UK firms at risk from attacks on crypto keys, digital certificates

    Jul 01, 2015

  • Emojis for passwords

    Emojis for passwords

    Jun 30, 2015

    During the last month, there has been much talk about how successful a system where the password is entirely replaced by emojis might be. The idea of replacing passwords with images or icons is not a new one, but came up again when the company “Intelligent Environments”, a financial software development company, introduced a passcode authentication system using emojis.
  • Have_you_been_hacked_20161017

    The rise of ethical hacking

    Jun 30, 2015

    7Safe’s Aleksander Gorkowienko, a penetration testing expert, is quoted in an article in Mobile Europe about the rise of ethical hacking. The article discusses whether ethical hacking by telecoms firms is the answer to testing and securing internet of things devices.