Making the
world a
safer place

Jumping the APRA Hurdle! Prudential Standard CPS 234

Our GRC consultant Gijo Varghese went through the main requirements from APRA CPS 234, providing timely models and ideas on how to effectively meet compliance with the standard. For any assistance you require with this standard or any other cyber security & risk management requirement please reach out. We’d be more than happy to add…

CQR UK’s winning streak continues

Congratulations to the CQR UK team on winning the Hi-Tech-Innovative Businesses Award as part of the 50 to Watch in Oxfordshire.  The award is part of the 50 to Watch in Oxfordshire and is a testament to the hardworking team who are helping our clients become more resilient and cyber secure around the globe. Congratulations…

CQR Celebrating Women in Cyber

@CQR was founded with the mission of ‘Making the World a Safer Place’. As our business continues to grow in our UK and US markets we have recruited the best candidates available with key capabilities such as passion, accountability, communication and leadership which enable the delivery of our cyber services across the technical, governance, risk…

CQR Wins Two West Oxfordshire Business Awards

PRESS RELEASE APRIL 1, 2019 CQR won two prestigious awards at the 2019 West Oxfordshire Business Awards (WOBAs). CQR an independent global provider of cyber security and resiliency services had a memorable night and were thrilled to win the Small Business award sponsored by Veritrec and Greg Inge, CQR founder was awarded the Business Person…

Are you cyber secure?

An informative Breakfast Seminar organised by CQR UK in conjunction with corporate & technology lawyers White & Black and hosted by Hosted by MP Robert Courts, at the stunning world heritage site Blenheim Palace.   Our knowledgeable speakers will be covering: Core practices to keep your business secure Types of breach & how to respond…

CQR Security Bulletin – LibSSH >0.6 Authentication Bypass

If someone knocks on your door, it would be reasonable to determine who it might be.  Upon asking “who is it?”, if they were to respond with “I can come in!” you may be taken aback and make additional attempts to work out who it actually is.   SSH, or Secure Socket Shell is a…

Unauthorised mobile porting, how could it possibly affect me?

Multi-factor authentication (“MFA”) is a technology which has seen widespread adoption across numerous platforms such as Facebook, Google and various Microsoft services.  It requires users to have two or more factors prior to access being granted to their account.  This is typically implemented through something known to the user, i.e. a password, and something they…

Petya Ransomware Virus

What is the risk? Known as Petya, Petrwrap or GoldenEye, this ransomware virus has been in circulation since 2016.  However, it has, gained traction internationality with recent source code modifications to include the NSA exploits “EternalBlue” and “EternalRomance”.  It is believed this recent wave started in the Ukraine and Russia, with infrastructure, airports, public transport…

Docker – Just another virtualisation technology?

Before we discuss Docker, lets understand what virtualisation is and the different types of virtualisation. Virtualisation is the creation of a virtual (not actual) version of something, which might be an operating system, hardware or storage.  In general, a Virtual Machine emulates a physical computing environment, where the CPU, hardware, memory and other components are…

Moving Beyond P@$$w0rd

The US National Institute of Standards and Technology (NIST) is currently finalising updates to its Digital Identity Guidelines[1], which provide guidance on user authentication to systems and applications.  Three recommendations which may come as a surprise are not enforcing password complexity, not requiring periodic password changes and not using phone or SMS verification.  But before…

We use cookies on this site to provide you with a better user experience. Read More