Your journey to Defence Cyber Certification

The DCC process requires careful consideration and sufficient staff resource to succeed. Before requesting a quote, please read this document to identify the type of quote you require. Quotes can be issued in relation to helping prepare the scope and also to perform the assessment The different phases of the engagement process is described below. …

Apprenticeships are preferred pathway for career-focused West Cumbrian teens.

Apprenticeships have become a first choice for many young people in West Cumbria keen to develop a career without thousands of pounds of university debt and Indelible Data is continuing to support the next generation to do this. Traditionally, an apprenticeship was seen as the inferior alternative to a university education but it’s becoming a …

Ni8mare: Critical n8n vulnerability puts self-hosted instances at risk

A new maximum-severity vulnerability has been discovered in the workflow automation platform n8n. Tracked as CVE-2026-21858 and known as Ni8mare, the flaw allows unauthenticated attackers to fully hijack vulnerable self-hosted n8n instances.   The impact of this vulnerability is significant. n8n is frequently used to store API keys, access tokens, and other secrets, while coordinating …

Cyber security never more important after 130% surge in attacks

Indelible Data’s Cyber Security Update: What’s Happening and What Your Organisation Should Do Next The last month has been one of the busiest on record for UK cyber security, with major incidents, regulatory changes and new technical vulnerabilities shaping the threat landscape. Businesses of all sizes – from enterprise manufacturers to schools and SMEs – …

Back to pen and paper for resilience

Don’t just fix vulnerabilties, remember to keep a paper-based copy of Disaster Recovery Plans In light of the recent high profile attacks on Jaguar Land Rover, Co-op Group and Marks and Spencer, the UK government and the National Cyber Security Centre (NCSC) is not only promoting use of the Cyber Essentials Scheme to bolster defenses, …

You may not have to throw away your Windows 10 Device away after October 14th 2025

We recommend everyone, where possible, updates their Windows 10 Operating System to Windows 11 before support runs out on October 14th 2025, but we are also aware of the impact upon the environment of throwing older devices into landfill just because they are not compatible with Window 11, writes lead Cyber Essentials assessor Tony Wilson …

July Cyber Wrap-up blog

July Cyber Security Wrap-Up: AI Threats, SharePoint Flaws, Teams Malware & More As cyber threats become more targeted and sophisticated, July delivered several key developments in the cyber security space that organisations need to act upon writes Marketing Co-ordinator Abbey Wright. From emergency patches and phishing attacks to AI-powered scams and new defence initiatives, here’s …

Attackers are using AI to compromise our systems – but we can use AI to defend ourselves too!

We often hear of hackers and fraudsters using AI against us, for example, by typing a couple of prompts as it is all too easy for low skilled attackers to produce perfectly worded phishing emails designed to make us want to click on links and download malicious files, writes Managing Director Tony Wilson. Attackers can …

Cyber Wrap-Up – June 2025: 7 Key Cyber security threats and what you can do

Compiled by Marketing Coordinator Abbey Wright Cyber Wrap-Up – June 2025: 7 Key Cyber security threats and what you can do: June has been a heavy month in the world of cyber security, with serious vulnerabilities, creative phishing tactics, and a staggering data breach affecting billions. We want to keep our clients informed and protected. …

Cyber Essentials – FAQs

The Cyber Essentials scheme is a UK government-backed cyber security certification designed to protect organisations from common cyber threats. Below are the most commonly asked questions about the scheme. What is the Cyber Essentials Scheme? It is a government-backed certification helping organisations protect against common cyber threats through five key controls: firewalls, secure configuration, user …