In the blog Secure Delivery of a Payload we discussed how secure information exchange consists of two distinct elements: the information you need to convey – the payload, and the technical method used to carry the payload – the protocol. Attackers wishing to break into your network can exploit either of these: the protocol or the payload.
Continue reading “Validating the Payload”
Tag: Cyber Essentials
Why have I got an Intruder Alarm?
At home, I have invested in good quality locks on my doors and windows, conforming to the standard required by my insurance company. In addition to that I have also invested in an intruder alarm.
UK Public Procurement Policy Note 09/14
Now that’s a catchy headline to get your attention! What does it mean, and why blog about it on Cyber Matters?
In short, the policy note published by the Cabinet Office today (Sept 26 2014) says that from October 1st, the Cyber Essentials Scheme is mandatory:
Why I became a Cyber Champion
A couple of weeks ago I was asked to speak at Thomson Reuters, a multinational media and information firm, who were trying to get more of their young professionals interested in becoming Cyber Champions.
Is there any point in using anti-virus software?
I recently attended a professional development event in Birmingham run by OWASP and the Institute of Information Professionals (IISP). One of the topics on the agenda was how to evade anti-virus (AV) software packages.
Shock horror. The breaking news is that AV software is not going to stop cyber attacks on your organisation, as has been blogged on before here on Cyber Matters.
However two aspects stood out for me.
Continue reading “Is there any point in using anti-virus software?”
The Cyber Essentials Experience
This month the UK Government Cyber Essentials Scheme was launched.
Nexor committed to gaining Cyber Essentials certification, with Steve Kingan observing:
“I welcome the advent of the Cyber Essentials Scheme and believe it is an important development in improving the supply chain to HMG. Nexor has demonstrated that the Scheme can be straight forward to implement even for an SME. I am pleased that this new mark will become a mandated accreditation for all HMG suppliers of sensitive information technology procurements; and delighted that Nexor has been involved from the start of the Scheme.”
Trustworthy Communications
Each day we become more reliant on the Internet in both our personal and business lives, yet each day there are new stories of security failures. A key part of living and working on the Internet is the ability to be able to communicate securely; whether inter-personal communication, such as email or chat, or client / server communication to access a web site.
This blog looks at how and why secure communications fail, and what we can do about it.
Should I Invest in Bitcoin?
Bitcoin had a hard time in February 2014, is it a viable investment for a cautious digital immigrant?
IISP East Midlands: BIS Organisational Standards
On January 29, we held the second IISP meeting in the East Midlands, at the Institute of Directors in Nottingham, attended by close to 30 delegates.
The meeting was opened by Colin Powers with an introduction and explanation that some quick reshuffling of the agenda was in order as the main speakers train was running late. He also published the hash-tag #IISPEastMids, with delegates encouraged share their thoughts on the meeting live via twitter (these tweets are available as an archive).
Continue reading “IISP East Midlands: BIS Organisational Standards”
Reaction to BIS Cyber Security Standard
Making an organisation cyber-secure is difficult. As a supplier, demonstrating to an external customer that you are cyber-secure is even more difficult. Conversely, as a customer how can you tell which organisations take it seriously?
Continue reading “Reaction to BIS Cyber Security Standard”