Cyber Business ​Blog

7Safe's trusted cyber security experts share insights in this blog to help business executives understand, keep up-to-date and manage cyber security risks.

select
  • law_enforcement

    UK Government mandates new cyber security standard for suppliers from 1 October – make sure you’re compliant

    Oct 01, 2014

    From today, 1 October 2014, the UK Government requires all organisations bidding for contracts which process commercially sensitive or personal information to be certified against the Cyber Essentials Scheme. Officially launched on 5 June 2014, organisations who successfully complete the scheme through a CREST (Certified Register of Ethical Security Testers) accredited supplier, will be awarded [...]
  • government

    Handing over the keys to the crown jewels

    Sep 08, 2014

    We are all users of energy and water and very much take for granted that they are almost always there when we need them.  Working away in the background to make this so are a myriad of safety and mission critical industrial control and automation systems. For many years the organisations using such systems have [...]
  • mobile password

    Mobile password managers: are they really keeping your data secure?

    Aug 07, 2014

    As technology advances, it has become increasingly clear that desktop and laptop computers are becoming a thing of the past for the everyday user. Average consumer needs generally include online shopping, access to social media websites, the use of office programs and email accessibility. All those needs are now covered by smart phones and tablets, making the use of the traditional laptop and desktop almost obsolete – primarily due to the flexibility, power and autonomy of mobile devices.
  • Phishing

    Is your system an open goal for attackers?

    Jul 03, 2014

    The World Cup is happening now, and for all of us, whether we like football or are trying to pretend we are not interested at all, – it is very hard to ignore. Love it or hate it, we all know about it.
  • Funding

    €100m investment at the fraction of the price

    Jun 23, 2014

    With news about data breaches and privacy continuing to claim regular columns in newspapers and analysts discussing the risks about handling big data, you may be wondering what the fuss is all about. But, if you start to look more closely at the level of risks involved, you could be easily thrown into a sea [...]
  • microsoft-windows-xp

    What to do if you’re using Windows XP

    May 30, 2014

    Microsoft recently announced that they have stopped providing support for one of their key operating systems. Windows XP was created in 2001 by Microsoft as part of their Windows NT family of operating systems and, during its 13 year lifespan, Windows XP became a staple for many PC users being used in peoples’ homes and [...]
  • shutterstock_100931329

    HACKsight – a snapshot of the security vulnerabilities found last month

    May 06, 2014

    As active contributors to the cyber security arena, we in 7Safe are always looking at ways of sharing our work help you improve your security. As part of that, we have developed a monthly infographic bulletin called HACKsight which we hope will provide an interesting and informative resource.  HACKsight is a high-level snapshot of security vulnerabilities [...]
  • shutterstock_163229387

    Complexity is the enemy of security

    Mar 25, 2014

    Author:Stephen Hancock The kings and barons of history sought security in heavily fortified castles.  There might be a central keep with a surrounding wall, all on top of a mound; perhaps with a moat as well.  Of course, there also had to be a way to get in, hence a door, heavily fortified within a [...]
  • Image_10199_(mini)

    Your PCI assessment really doesn’t need to be so hard

    Oct 09, 2013

    Nobody wants to go through a PCI DSS assessment but if your business takes credit cards then sooner or later you are going to have to. There are plenty of technical solutions in the marketplace claiming to make compliance easier and quite of lot of guidance around achieving compliance. The focus of this article is [...]
  • shutterstock_310500899

    Thinking the Unthinkable: What if a Cyber Attack Succeeds?

    Jul 30, 2013

    Jerome Smith, penetration tester and ethical hacking training instructor at 7Safe, part of PA Consulting Group, invites you to ask the big “what if?” question.