‘Good morning, I is Nigel from Microsoft – you has a virus!’

By Jason McNicholas Cyber Security Apprentice Phone scams are one of the many ways criminals steal money from people. It can be viewed as a form of vishing (voice phishing) since they are often masquerading as a legitimate organisation (usually a respectable authority such as; Microsoft or a branch of government). They could be claiming …

‘We have your password’

By Jason McNicholas Cyber Security Apprentice A Family member came to me saying that they received this Scam email from their own account which included her actual password, the Email however, went into spam. This is an example of credential stuffing for blackmail/extortion. If you receive an Email like this it’s extremely unlikely that they will …

New weekly Blog launched

With technicians on the front line of the cyber war, we thought it time Indelible Data shared our in-house knowledge and experience. From translating NCSC’s latest advice into bite-sized articles, to bringing you the latest on cyber news, advice and emerging threats, Indelible Data’s weekly Blog posts will keep you up to date. We’ll also …