Some of the known tools developed by Julian Assange

By Jason McNicholas Cyber Security Apprentice With the news of Julian Assange being arrested in the Ecuadorian Embassy, people may be wondering why he is charged with hacking by the United States government as many people only see Assange as a journalist and not a hacker. The centre of the hacking allegation stems from the …

Securing the Supply Chain

Following just 12 principles is enough to secure supply chains to meet the assurance demands of today’s customers. The principles were published as guidance by NCSC to help establish effective control and oversight of supply chains. You must understand the risks before establishing control then checking arrangements and putting in place what is required for …

Driving home the threats to online cars

By Jason McNicholas Cyber Security Apprentice With internet connected cars becoming more and more commonplace, security issues are also becoming more apparent. Flaws are being found in cars that can cause hackers to remotely take over a car with potentially very dangerous consequences. The following link is a video by WIRED Magazine showing 2 security …

Fast Cyber Essentials certification

Quality and speed of service is what makes Indelible Data stand out from the crowd according to its customers. Most who responded to a recent customer survey conducted by the Cyber Essentials Certification Body, chose the company because of recommendation or reputation. Indelible Data has passed more than 1500 submissions since the Government launched the …

Tips on passing Cyber Essentials first time

By Jason McNicholas Cyber Essentials assessor Important note: As of 1st April 2020 the Cyber Essentials Scheme changed structure and there is now only one NCSC Trusted Partner (IASME) coordinating Certification Bodies and other Cyber Essentials realated activities. For a comprehensive guide to passing first time using the IASME questionnaire, please purchase our updated companion …

Remote working: Great for some but a Cyber headache for others

By Euan Henderson Cyber Security Apprentice Using remote working solutions may make it easier for employees to collaborate but with it come new risks. These risks come in many forms and a few examples include password spraying (a term to describe attackers trying to log into multiple accounts using a single password) and phishing to …

‘Good morning, I is Nigel from Microsoft – you has a virus!’

By Jason McNicholas Cyber Security Apprentice Phone scams are one of the many ways criminals steal money from people. It can be viewed as a form of vishing (voice phishing) since they are often masquerading as a legitimate organisation (usually a respectable authority such as; Microsoft or a branch of government). They could be claiming …

‘We have your password’

By Jason McNicholas Cyber Security Apprentice A Family member came to me saying that they received this Scam email from their own account which included her actual password, the Email however, went into spam. This is an example of credential stuffing for blackmail/extortion. If you receive an Email like this it’s extremely unlikely that they will …

New weekly Blog launched

With technicians on the front line of the cyber war, we thought it time Indelible Data shared our in-house knowledge and experience. From translating NCSC’s latest advice into bite-sized articles, to bringing you the latest on cyber news, advice and emerging threats, Indelible Data’s weekly Blog posts will keep you up to date. We’ll also …