Organised Cyber Gangs and how they operate.

By Euan Henderson Cyber Security Apprentice For most people, the word ‘hacker’ conjures images of hooded loners sitting in darkened rooms focused on lines of codes on a computer screen. You may be surprised to learn that many hackers form part of an Organised Criminal Group (OCG) or ‘Cyber Gang’ with designated roles and even …

Ready to help! Staff become Mental Health First Aiders

It can be easy to spot the signs of someone struggling mentally but knowing how and when to help can be a much tougher challenge. Two members of staff at Indelible Data have become Mental Health First Aiders, accredited by Mental First Aid England following a two-day course organised by Britain’s Energy Coast Business Cluster. …

Cyber Essentials and Cyber Essentials Plus – FAQs

How do I become Cyber Essentials certified? Download the questionnaire here Complete it, ensuring all questions are answered and a board level officer has signed at the bottom. Submit using the secure upload page on our website. We’ll assess it in as little as 24hrs if you chose the expedited service and request clarifications if …

Anti-spoofing controls – stopping the email impostors

By Euan Henderson Cyber Security Apprentice Three controls that should be configured are: Sender Policy Framework (SPF) DomainKeys Identified Mail (DKIM) Domain based Message Authentication, Reporting & Conformance (DMARC) records NCSC recommends the following: That all domains have the SPF and DMARC records in place, regardless of whether the domain is or is not used …

Stop downloaded files running without warning

By Tony Wilson Senior consultant We are often asked how to prevent, or alert the user that, an untrusted file has been downloaded from the internet. This is a requirement of Cyber Essentials and relates to question 4.5 of our questionnaire. It is often a good idea to check your anti-virus programme as it may …

Bringing down the barriers to Cyber Essentials Certification

By Jason McNicholas Cyber Security Apprentice The Indelible Data tech team attended Infosec in London looking for tools and services that would help companies achieve Cyber Essentials. Our highest priority was to identify a way in which small companies could implement two-factor authentication affordably. After trawling hundreds of stands, they found a great solution from …

Indelible Data certifies 1000 customers to Cyber Essentials

Indelible Data is celebrating certifying more than 1000 companies to Cyber Essentials and Cyber Essentials Plus as the scheme reaches its fifth anniversary. From FTSE 100 company Whitbread Plc and multinationals like 8×8 Inc and Xerox Ltd, to SMEs and micro businesses, Indelible Data has assessed and assisted organisations seeking to keep their systems safe …

Making sense of Cyber Essentials – AutoRun and AutoPlay

By Jason McNicholas Cyber Essentials Assessor There is often a lot of confusion about the ‘AutoRun’ and ‘AutoPlay’ features of the Windows Operating System. Both features relate to the behaviour of a computer when removable media is inserted, however these features are completely independent of each other. Note that none of these functions have anything …

How to make Office 365 Exchange block executable content

By Tony Wilson Senior consultant Indelible Data has found that many companies trying to comply with Cyber Essentials, particularly those wishing to prevent emailed executable files running without sufficient warning, are actually blocking valid, often important, files arriving into user inboxes. For example, the Cyber Essentials Plus test includes executables contained in zip (container) files …

Fighting back for internet privacy

By Jason McNicholas Cyber Security Apprentice For years, governments and companies have slowly, but surely,  attempted to stamp out internet anonymity for users, from legislation to small print on Terms and Conditions, data is constantly being gathered on everyone. Within the last few years, VPN (Virtual Private Network) usage, to disguise the user’s IP address …