Cyber Business ​Blog

7Safe's trusted cyber security experts share insights in this blog to help business executives understand, keep up-to-date and manage cyber security risks.

select
  • mobile security

    Mobile attacks: Should you be worried?

    Jun 22, 2015

  • ethical_hacking

    Learn from the Experts

    Jun 19, 2015

    PA Consulting, in association with the National Analyst Working Group (NAWG), surveyed 48 law enforcement organisations across the UK and discovered that the time spent on investigating cybercrime is expected to treble over the next three years; and yet only 30% believe that they have the skills and tools to do the job effectively.*
  • custom_courses

    Invest in your people for effective security

    Jun 19, 2015

    Over one billion data records were lost or stolen in over 1,500 corporate breach incidents during 2014*; the equivalent of 32 records every single second. Retail and Financial sectors were unsurprisingly the primary contributors in terms of the number of records affected, although it is the Healthcare sector that accounted for over 25% of the breaches reported, with Government, Technology and Education not far behind.
  • microsoft-windows-xp

    Still using XP: at risk, but not alone

    Jun 18, 2015

    Despite Microsoft removing support for Windows XP over 12 months ago, 17% of desktop internet traffic still comes these machines, making it currently the second most popular operating system behind Windows 7.
  • email_malware_blue

    What’s in your inbox ?

    Jun 18, 2015

    We all receive dozens, if not hundreds of emails every single day, but did you know that as many as one in 284* contain malware that could potentially leave you or your organisation open to a damaging breach or compromise. So, in a company of 1000 people, receiving a modest 10 external emails each per working day that’s over 8,000 attacks on your company throughout the year. And if you think your anti-virus software will take care of this, then consider that studies have shown that the initial detection rate for new viruses by AV can be as low as 5%**.
  • information_security

    Why you should care about an old hashing algorithm

    Jun 01, 2015

    It has been some years now since the US National Institute for Standards and Technology announced that the SHA-1 encryption algorithm should no longer be regarded as secure and required US federal agencies to move away from its use, so why does this now matter to senior business officers?
  • PCI DSS

    Why you should treat PCI DSS as though it was the law

    Mar 20, 2015

  • This software seems a bit fishy…

    Mar 04, 2015

    Superfish?  No, it’s not a new comic book character, it’s the latest security issue taking the Internet by storm.  In the past few weeks, Lenovo were left rather red faced after news broke of the substantial privacy issues caused by the Superfish software, which came pre-installed on Lenovo notebook computers between September 2014 and February [...]
  • e-cig

    No smoke without malware: do you know E-Cigarettes can compromise your system?

    Feb 22, 2015

    2014 saw the e-cigarette (e-cig) boom in popularity and as people start making their New Year’s resolutions more smokers may consider it as an option in an attempt to give up. When the e-cig is lit up, it heats the liquid nicotine and the liquid turns into vapour, which is then vaped (a word which has also been recently added to the Oxford English Dictionary). Although vaping seems to be an easier alternative to going cold turkey, like many other gadgets available in the market, the e-cig is also vulnerable to security threats.
  • Please confirm your identity – what is your account number?

    Feb 03, 2015

    You’re watching TV at home and the phone rings… “Hello, this is Bob from Microsoft. How are you today? We’re investigating a large number of Windows problems that have been happening lately. Would you mind if I help you see if your system is affected?”