Cyber Matters

By Colin Robbins | Bite-size insight on Cyber Security for the not too technical, via @colinrobbins and @nexor

The “NHS” Attack

The poor and inaccurate reporting of the NHS Ransomware incident over the weekend has irked CyberMatters into coming out of hibernation. With so much …

The last post

<b>CyberMatters started almost 5 years ago, as a proof of concept blog platform for Nexor. Over that time, we’ve covered a wide range of topics from</b> …

PKI – is there a better way?

PKI is a technology that has stood the test of time, but it is let down by high running costs and poor implementation. <br>My first exposure to PKI was …

Li-Fi Security

Li-Fi has been widely talked about, largely due to its capability to deliver a high data rate wireless connectivity.Li-FI has some very interesting …

Bah-Humbug

<b>Having been on a customer site all day, I returned home to scan my email.</b>Over half the emails were festive greetings, with all sorts of creative …

Out of Office Dilemma

<b>As we approach the Christmas holiday period, I thought I’d share a cautionary tale on setting up your Out-of-Office auto-response. For quite a while</b> …

Payment Services Directive

So, Tesco was hacked. Although there is no official word yet on how this happened, the chatter among people far smarter than me are suggesting the …

S/MIME Re-trial

In the blog S/MIME on Trial in 2013, I outlined some challenges using S/MIME to send secure email.I also posed the question, was I confident the …

Smart Home Project – HomeKit and LightwaveRF Integration

CyberMatters is a blog about security. <b>This article is NOT about security</b>, there is a related security point related to this article documented in the …

3 key ways to stop ransomware

<b>At the recent East Midlands Cyber Security Forum (EMCSF), I was fortunate enough to have the opportunity to chair a panel session on the topic of</b> …

Smart Home Project – Network Segregation

Over the last few weekends I’ve rebuilt my smart home solution. It reminded me of how hard it is to build something that is secure.First, you will …

Top cyber crime threats to East Midlands businesses

I recently attended the East Midlands Cyber Crime Breakfast, where a panel of experts outlined what they saw as the principal cyber crime threats …

How can firms protect themselves from ransomware?

In a previous blog post I wrote about the rise of ransomware over the last year. In this post I will briefly outline what steps organisations should …

The importance of having an Asset List

<b>In July I attended and presented at the East Midlands Cyber Security Conference and Expo, at the National Space Centre in Leicester.</b>In their …

What is ransomware?

Computer hacking has evolved considerably over the past 20 years. What was once a “hobby” to demonstrate technical prowess, by breaking into systems …

Windows 10 Anniversary Update – BitLocker Bypass Warning

If your Windows 10 PC tells you there is an update pending – it might be the Windows 10 Anniversary Update (not that you can distinguish this from …

CEOs: How to avoid a cyber pay-cut

The Culture, Media and Sport Committee, appointed by the House of Commons, has produced a report on “Cyber Security: Protection of Personal Data …

What can you learn from a Padlock?

In the address bar of THIS blog, you should see a little padlock…<i></i> <br>In this case, using the Chrome browser, it’s before the URL.<br>Internet Explorer has …

Security / Inaction contradiction

In the blog Data Trust Gap I explored industry reports that customers see privacy as really important, and state it affects buying decisions, yet …

Is your browser in the Goldilocks zone?

<b>If your web browser is too old, you will not be able to access sites using strong security.</b> <b><br>If your web browser is too new, it will prevent you</b> …

Trustworthy Wallets

Bitcoin is a subject that Cyber Matters first reported on two years ago, concluding it was premature to invest, unless you can afford to lose your …

Considerations when Managing IoT Device Keys

As we rapidly advance to the new world of the Internet of Things, security is slowly but surely starting to be talked about. Managing keys is an …

How do you dispose of your Smart Home?

A few weeks back, I worked with the SH&BA to publish guidance on the Security of your Smart Home.Shortly before we went to print I sold my car, and …

Q: When will the IoT be secure? A: Never.

That may seem a bit bizarre coming from someone working for a company that specialises in making the IoT secure. Let me justify the comment.Replace …

The Insider Threat

According to the latest UK Cyber Breaches statistics, three-quarters of large organisations suffered a staff-related breach and nearly one-third of …

Cyber Essentials at UK MOD: the beginning of a critical mass?

The UK’s Cyber Essentials Scheme took a major step forward at the beginning of this year when the UK Ministry of Defence (MOD) mandated that its …

Why is my Password Too Long?

Dear Virgin MediaI recently decided it was time to change my password on my NTLWorld email account (managed by Virgin Media). I entered a new …

Another week, another IoT security scare!

With the recent events and stories hitting the news, such as CES 2016 announcing plenty of new IoT products and new toys being hackable, no wonder I …

Could PAS 754 have helped Juniper?

In an important Juniper security announcement last month it was revealed that:<i>“During a recent internal code review, Juniper discovered unauthorized</i> …