You may not have to throw away your Windows 10 Device away after October 14th 2025

We recommend everyone, where possible, updates their Windows 10 Operating System to Windows 11 before support runs out on October 14th 2025, but we are also aware of the impact upon the environment of throwing older devices into landfill just because they are not compatible with Window 11, writes lead Cyber Essentials assessor Tony Wilson …

July Cyber Wrap-up blog

July Cyber Security Wrap-Up: AI Threats, SharePoint Flaws, Teams Malware & More As cyber threats become more targeted and sophisticated, July delivered several key developments in the cyber security space that organisations need to act upon writes Marketing Co-ordinator Abbey Wright. From emergency patches and phishing attacks to AI-powered scams and new defence initiatives, here’s …

Attackers are using AI to compromise our systems – but we can use AI to defend ourselves too!

We often hear of hackers and fraudsters using AI against us, for example, by typing a couple of prompts as it is all too easy for low skilled attackers to produce perfectly worded phishing emails designed to make us want to click on links and download malicious files, writes Managing Director Tony Wilson. Attackers can …

Cyber Wrap-Up – June 2025: 7 Key Cyber security threats and what you can do

Compiled by Marketing Coordinator Abbey Wright Cyber Wrap-Up – June 2025: 7 Key Cyber security threats and what you can do: June has been a heavy month in the world of cyber security, with serious vulnerabilities, creative phishing tactics, and a staggering data breach affecting billions. We want to keep our clients informed and protected. …

Cyber Essentials – FAQs

The Cyber Essentials scheme is a UK government-backed cyber security certification designed to protect organisations from common cyber threats. Below are the most commonly asked questions about the scheme. What is the Cyber Essentials Scheme? It is a government-backed certification helping organisations protect against common cyber threats through five key controls: firewalls, secure configuration, user …

May’s cyber wrapup – Passkey, Marks & Spencer and Phishing scams

May has been a pivotal month in cyber security, marked by significant developments and stark reminders of the evolving threat landscape. Here’s an overview of the key events and insights from Marketing Coordinator Abbey Wright:   CyberUK 2025: At the CyberUK 2025 conference, Richard Horne, CEO of the National Cyber Security Centre (NCSC), emphasised that …

7-step guide for you and your family after cyber attacks

By Indelible Data Managing Director Tony Wilson Your data has been involved in a cyber-attack – now what? Another day, another high profile hack. I can sympathise with anyone feeling overwhelmed by the sheer amount of cyber-related news at the moment so I’ve created a 7-step guide for you and your family after cyber attacks. …

CyberUK 2025 – Proactive resilience is key to business security

By Tony Wilson, Indelible Data Managing Director A key theme resonating throughout the NCSC’s flagship CyberUK event was “proactive resilience” with many speakers, and vendors, using the phrase “controlling the controllables” as the key to business security. The event brought together cyber security leaders, innovators, and policymakers to tackle the evolving threat landscape. Richard Horne …

April Cyber Security Wrap-up – exchange server deadline, Android 12 Support Ends & major breaches

April brought key cyber security shifts, from upcoming software deadlines to evolving compliance rules and serious data breaches. Here’s Marketing Coordinator Abbey Wright‘s review of what your business needs to know: Microsoft Exchange Server 2016/2019 reaches end of support in October Support for Microsoft Exchange Server 2016 and 2019 ends October 14, 2025. After this, …

March cyber security wrap-up: Major vulnerabilities, attacks & breaches

March has been a turbulent month in the world of cyber security, with multiple high-profile vulnerabilities, breaches, and cyber attacks making headlines – read marketing co-ordinator Abbey Wright’s review. From a critical flaw in Veeam Backup & Replication to a sophisticated zero-click attack on WhatsApp, let’s dive into the most pressing threats and their implications. …