Attackers are using AI to compromise our systems – but we can use AI to defend ourselves too!

We often hear of hackers and fraudsters using AI against us, for example, by typing a couple of prompts as it is all too easy for low skilled attackers to produce perfectly worded phishing emails designed to make us want to click on links and download malicious files, writes Managing Director Tony Wilson. Attackers can …

Cyber Wrap-Up – June 2025: 7 Key Cyber security threats and what you can do

Compiled by Marketing Coordinator Abbey Wright Cyber Wrap-Up – June 2025: 7 Key Cyber security threats and what you can do: June has been a heavy month in the world of cyber security, with serious vulnerabilities, creative phishing tactics, and a staggering data breach affecting billions. We want to keep our clients informed and protected. …

Cyber Essentials – FAQs

The Cyber Essentials scheme is a UK government-backed cyber security certification designed to protect organisations from common cyber threats. Below are the most commonly asked questions about the scheme. What is the Cyber Essentials Scheme? It is a government-backed certification helping organisations protect against common cyber threats through five key controls: firewalls, secure configuration, user …

May’s cyber wrapup – Passkey, Marks & Spencer and Phishing scams

May has been a pivotal month in cyber security, marked by significant developments and stark reminders of the evolving threat landscape. Here’s an overview of the key events and insights from Marketing Coordinator Abbey Wright:   CyberUK 2025: At the CyberUK 2025 conference, Richard Horne, CEO of the National Cyber Security Centre (NCSC), emphasised that …

7-step guide for you and your family after cyber attacks

By Indelible Data Managing Director Tony Wilson Your data has been involved in a cyber-attack – now what? Another day, another high profile hack. I can sympathise with anyone feeling overwhelmed by the sheer amount of cyber-related news at the moment so I’ve created a 7-step guide for you and your family after cyber attacks. …

CyberUK 2025 – Proactive resilience is key to business security

By Tony Wilson, Indelible Data Managing Director A key theme resonating throughout the NCSC’s flagship CyberUK event was “proactive resilience” with many speakers, and vendors, using the phrase “controlling the controllables” as the key to business security. The event brought together cyber security leaders, innovators, and policymakers to tackle the evolving threat landscape. Richard Horne …

April Cyber Security Wrap-up – exchange server deadline, Android 12 Support Ends & major breaches

April brought key cyber security shifts, from upcoming software deadlines to evolving compliance rules and serious data breaches. Here’s Marketing Coordinator Abbey Wright‘s review of what your business needs to know: Microsoft Exchange Server 2016/2019 reaches end of support in October Support for Microsoft Exchange Server 2016 and 2019 ends October 14, 2025. After this, …

March cyber security wrap-up: Major vulnerabilities, attacks & breaches

March has been a turbulent month in the world of cyber security, with multiple high-profile vulnerabilities, breaches, and cyber attacks making headlines – read marketing co-ordinator Abbey Wright’s review. From a critical flaw in Veeam Backup & Replication to a sophisticated zero-click attack on WhatsApp, let’s dive into the most pressing threats and their implications. …

Taking Cyber Essentials to the next level – with our Platinum service

Our Platinum package is taking Cyber Essentials to the next level by combining Cyber Essentials Basic certification with 12 months external Vulnerability Scanning for the price of 10. Your Cyber Essentials certification will reassure customers that your company’s cyber security controls will protect against the vast majority of common online attacks. This is coupled with …

Apple’s iCloud Backup Changes: Implications for User Privacy

Apple, a company often recognised for its commitment to user privacy, has recently modified its iCloud backup encryption practices, prompting concerns about data security as Cyber Security Technologist Chris McGee investigates. Previously, iCloud backups were protected by end-to-end encryption, meaning even Apple could not access the stored information. The current system raises the possibility of …