Cyber Matters

By Colin Robbins | Bite-size insight on Cyber Security for the not too technical, via @colinrobbins and @nexor

Out of Office Dilemma

<b>As we approach the Christmas holiday period, I thought I’d share a cautionary tale on setting up your Out-of-Office auto-response. For quite a while</b> …

Payment Services Directive

So, Tesco was hacked. Although there is no official word yet on how this happened, the chatter among people far smarter than me are suggesting the …

S/MIME Re-trial

In the blog S/MIME on Trial in 2013, I outlined some challenges using S/MIME to send secure email.I also posed the question, was I confident the …

Smart Home Project – HomeKit and LightwaveRF Integration

CyberMatters is a blog about security. <b>This article is NOT about security</b>, there is a related security point related to this article documented in the …

3 key ways to stop ransomware

<b>At the recent East Midlands Cyber Security Forum (EMCSF), I was fortunate enough to have the opportunity to chair a panel session on the topic of</b> …

Smart Home Project – Network Segregation

Over the last few weekends I’ve rebuilt my smart home solution. It reminded me of how hard it is to build something that is secure.First, you will …

Top cyber crime threats to East Midlands businesses

I recently attended the East Midlands Cyber Crime Breakfast, where a panel of experts outlined what they saw as the principal cyber crime threats …

How can firms protect themselves from ransomware?

In a previous blog post I wrote about the rise of ransomware over the last year. In this post I will briefly outline what steps organisations should …

The importance of having an Asset List

<b>In July I attended and presented at the East Midlands Cyber Security Conference and Expo, at the National Space Centre in Leicester.</b>In their …

What is ransomware?

Computer hacking has evolved considerably over the past 20 years. What was once a “hobby” to demonstrate technical prowess, by breaking into systems …

Windows 10 Anniversary Update – BitLocker Bypass Warning

If your Windows 10 PC tells you there is an update pending – it might be the Windows 10 Anniversary Update (not that you can distinguish this from …

CEOs: How to avoid a cyber pay-cut

The Culture, Media and Sport Committee, appointed by the House of Commons, has produced a report on “Cyber Security: Protection of Personal Data …

What can you learn from a Padlock?

In the address bar of THIS blog, you should see a little padlock…<i></i> <br>In this case, using the Chrome browser, it’s before the URL.<br>Internet Explorer has …

Security / Inaction contradiction

In the blog Data Trust Gap I explored industry reports that customers see privacy as really important, and state it affects buying decisions, yet …

Is your browser in the Goldilocks zone?

<b>If your web browser is too old, you will not be able to access sites using strong security.</b> <b><br>If your web browser is too new, it will prevent you</b> …

Trustworthy Wallets

Bitcoin is a subject that Cyber Matters first reported on two years ago, concluding it was premature to invest, unless you can afford to lose your …

Considerations when Managing IoT Device Keys

As we rapidly advance to the new world of the Internet of Things, security is slowly but surely starting to be talked about. Managing keys is an …

How do you dispose of your Smart Home?

A few weeks back, I worked with the SH&BA to publish guidance on the Security of your Smart Home.Shortly before we went to print I sold my car, and …

Q: When will the IoT be secure? A: Never.

That may seem a bit bizarre coming from someone working for a company that specialises in making the IoT secure. Let me justify the comment.Replace …

The Insider Threat

According to the latest UK Cyber Breaches statistics, three-quarters of large organisations suffered a staff-related breach and nearly one-third of …

Cyber Essentials at UK MOD: the beginning of a critical mass?

The UK’s Cyber Essentials Scheme took a major step forward at the beginning of this year when the UK Ministry of Defence (MOD) mandated that its …

Why is my Password Too Long?

Dear Virgin MediaI recently decided it was time to change my password on my NTLWorld email account (managed by Virgin Media). I entered a new …

Another week, another IoT security scare!

With the recent events and stories hitting the news, such as CES 2016 announcing plenty of new IoT products and new toys being hackable, no wonder I …

Could PAS 754 have helped Juniper?

In an important Juniper security announcement last month it was revealed that:<i>“During a recent internal code review, Juniper discovered unauthorized</i> …

Is your New Toy Hackable?

Over the last few days, many children will have received gifts of the latest interconnected toys. Sadly as a security community we know many of these …

Cyber Matters Top 10 posts from 2015

As 2016 approaches, I thought it would be nice to look back on 2015 and share with you the Top 10 most viewed blog posts here on Cyber Matters. Let …

Are you an Ethical Cyber Security Professional?

There has been quite a bit of debate on the internet recently about professionalism in the cyber security industry.Some well-informed, and some… …

Firestorm – how to avoid the latest Next Generation Firewall vulnerability

A new, severe vulnerability in Next Generation Firewalls was earlier this week unveiled by cyber threat detection specialist, Cynet. The …

Phishing Nets

Phishing is one of the most common forms of cyber-attack at the current time. Effectively attackers try and fool you to providing sensitive data such …