Cyber Business ​Blog

7Safe's trusted cyber security experts share insights in this blog to help business executives understand, keep up-to-date and manage cyber security risks.

select
  • UK_Cybersecurity_Breaches_Report

    Is your business too complacent about cyber security?

    May 04, 2017

    The results are in. Britain’s businesses need to get better at protecting themselves from cyber criminals. The UK’s Department for Culture, Media and Sport’s annual Cyber Security Breaches Survey seeks to uncover business attitudes toward cyber security and the nature and impact of breaches. So what picture emerges when we focus on medium and large businesses?
  • Ransomware threat triggers interest in CSIR at IP EXP 2016

    CSIR triggers interest at IP EXPO

    Oct 25, 2016

    Cyber Security Incident Response services + training were what IT Pros asked for at IP EXPO. Is CSIR the next Cyber buzzword?
  • Password panic

    NIST advice: Don’t use SMS for 2FA

    Aug 24, 2016

    NIST's new guidance on password management contains some surprising advice.
  • PCI DSS Sailing through rocky waters

    PCI DSS v3.2 – Rocks under the water?

    Jul 22, 2016

    PCI DSS 3.2 is not news, but how many organisations really know the waters they are navigating and the hazards beneath the surface?
  • Mind The Gap2

    UK CIOs: Skills Gap is Cyber Risk

    Jul 18, 2016

    77% of CIOs will face ever-growing cyber threats in the next five years due to skills shortages. 7Safe’s Michael Shuff asks: Why can’t UK companies find the right staff?
  • Passcode-interface

    New year, same old bad passw0rds

    Jan 28, 2016

    It's early 2016, yet the fifth annual list of the 25 worst passwords (pulled from the millions of stolen passwords made public throughout 2015) released by SplashData...
  • EU General Data Protection Regulation (GDPR)

    EU Data Protection Regulation: Approval expected soon

    Jan 08, 2016

    Whilst two years seems a long time away, it really isn’t when you consider the scale of the changes that organisations will have to make to ensure they are compliant with the GDPR.
  • Smart_car_systems

    The Hacker’s New Toy: Smart Cars

    Aug 28, 2015

    Researchers are discovering worrying security holes in the technology that powers smart cars. Most of the time these vulnerabilities are the result of car makers simply not having the right expertise when it comes to securing computer systems from cyber criminals.
  • The Secret's out!

    Ashley Madison: Unencrypted data exposes millions to public scandal

    Aug 21, 2015

    Millions of Ashley Madison’s customers greeted the news of data appearing on the dark web with mixture of deep anxiety and anger as their family life and professional reputations were put at risk. But was Avid Life Media’s handling of highly-confidential personal data any worse than other companies that have grown rapidly in the global online services boom?
  • Insure by Design?

    Insecure By Design?

    Jul 31, 2015

    The pressure to be first in the market creates its own dangers. Every day we are flooded by information about the newest technological solutions which obviously are intended to make our life easier and our work more efficient. This includes small vendors that want to pop-up and shine for a minute in the crowded IT market, as well as the large players such as Microsoft or Google. Competition is high and it is very important for every company to be able to present from time to time something unique.