The Electoral Commission failed Cyber Essentials certification ahead of major breach

The Electoral Commission has admitted failing Cyber Essentials at around the same time as it suffered a major security breach, writes Cyber Security Technologist Tyson McGuirk. In August 2021, names, addresses, and other personal information from the register was compromised in a suspected hack. This incident reflects the significance of the Cyber Essentials scheme as …

Should I include irregular devices and operating systems in Cyber Essentials?

The first step in a Cyber Essentials assessment is to determine what organisational data and organisational services are used in your business, writes Cyber Security Technician Tom Boughton. Common examples of organisational data are emails, documents, database data, or financial data, with common examples of organisational services being software applications, cloud applications, cloud services, and …

How will Windows Server 2012 EOL affect Cyber Essentials?

Windows Server 2012 and 2012 R2 have been among Microsoft’s most successful and widely used server Operating Systems since its release 11 years ago, writes Lead Assessor Jason McNicholas. Server 2012 and Server 2012 R2 will reach their end-of-life on 10th October 2023. This means that Microsoft will cease to provide security updates, bug fixes, …

PSNI Excel Data Breach – What are the lessons learned?

Access management controls and security awareness training could have helped prevent the Northern Ireland police data breach. Earlier this month, the Police Service of Northern Ireland (PSNI) confirmed a serious data leak  stemming from  a Freedom of Information request, writes Cyber Security Technician Thomas Boughton. The request led to an excel spreadsheet containing surnames and …

Vulnerability Scanning, Penetration Testing, and Cyber Essentials Plus – What’s the difference?

We are often asked to describe the differences between the different levels of technical assurance that we offer, writes Director Tony Wilson. In this blog we will focus on three different types of service and conclude with a hybrid service designed for companies with smaller budgets called a “Cyber Audit”: Cyber Essentials Plus Vulnerability Scanning …

Knots that bind – team building on Derwentwater

Glorious sunshine beat down on the Indelible Data staff as we battled it out on homemade rafts on Derwentwater during our latest team building event. Split into two teams led by Tom Boughton and Aidan Collins, there was quick decision making and problem solving needed to build rafts that floated. Rope knots learnt at cubs …

MOVEit breach – another good reason to achieve Cyber Essentials

Many UK organisations suffered data breaches when criminals exploited a vulnerability in Progress Software’s MOVEit file transfer app, but with the right patch management the impact could have been greatly reduced. Those with Cyber Essentials may have been at an advantage as the scheme helps organisations identify gaps in patch management through auditing of installed …

Cyber Essentials Plus – 11 challenges under Montpellier

This Checklist has been written by Lead Assessor Jason McNicholas to inform all applicants of the Fail criteria in the Cyber Essentials Scheme at PLUS level (CE Plus). This list is not exhaustive but highlights the common issues companies are finding – some of which pertain to the additional tests taken as part of the …

Cyber apprentices celebrate success and secure permanent jobs with Indelible Data

Aidan Collins has completed a cyber security apprenticeship and won a permanent role with Indelible Data at just 19 years of age. Aidan joined the company straight from West Coast Sixth Form in Workington, Cumbria, with a passion to pursue a career in the cyber sector. He has accepted a permanent job as a Cyber …

Completing Cyber Essentials just got easier!

Cyber Essentials applicants can now add helpers to their portal account to help with their submissions. The update is significant, especially for large organisations who require more than one staff member to work on their project or for those companies who require assistance from their managed service provider. It has coincided with the introduction of …