Making sense of Cyber Essentials – AutoRun and AutoPlay

By Jason McNicholas Cyber Essentials Assessor There is often a lot of confusion about the ‘AutoRun’ and ‘AutoPlay’ features of the Windows Operating System. Both features relate to the behaviour of a computer when removable media is inserted, however these features are completely independent of each other. Note that none of these functions have anything …

How to make Office 365 Exchange block executable content

By Tony Wilson Senior consultant Indelible Data has found that many companies trying to comply with Cyber Essentials, particularly those wishing to prevent emailed executable files running without sufficient warning, are actually blocking valid, often important, files arriving into user inboxes. For example, the Cyber Essentials Plus test includes executables contained in zip (container) files …

Fighting back for internet privacy

By Jason McNicholas Cyber Security Apprentice For years, governments and companies have slowly, but surely,  attempted to stamp out internet anonymity for users, from legislation to small print on Terms and Conditions, data is constantly being gathered on everyone. Within the last few years, VPN (Virtual Private Network) usage, to disguise the user’s IP address …

Email security: guarding against the expected

By Euan Henderson Cyber Security Apprentice In order to secure an organisation’s emails, TLS should be enabled as best practice. TLS stands for Transport Layer Security and is a security protocol that encrypts and authenticates data between services/applications and the end users. TLS v1.1 is not considered safe, so ensure that you use v1.2 wherever …

Cyber secure our future!

Malware and hackers might be the two biggest challenges facing Cyber Security but a skills shortage means the industry is struggling to keep pace. A recent study by the University of Roehampton has found that fewer 16-year-olds in England are getting a computing qualification. It also found that schools were cutting back on the hours …

Some of the known tools developed by Julian Assange

By Jason McNicholas Cyber Security Apprentice With the news of Julian Assange being arrested in the Ecuadorian Embassy, people may be wondering why he is charged with hacking by the United States government as many people only see Assange as a journalist and not a hacker. The centre of the hacking allegation stems from the …

Securing the Supply Chain

Following just 12 principles is enough to secure supply chains to meet the assurance demands of today’s customers. The principles were published as guidance by NCSC to help establish effective control and oversight of supply chains. You must understand the risks before establishing control then checking arrangements and putting in place what is required for …

Driving home the threats to online cars

By Jason McNicholas Cyber Security Apprentice With internet connected cars becoming more and more commonplace, security issues are also becoming more apparent. Flaws are being found in cars that can cause hackers to remotely take over a car with potentially very dangerous consequences. The following link is a video by WIRED Magazine showing 2 security …

Fast Cyber Essentials certification

Quality and speed of service is what makes Indelible Data stand out from the crowd according to its customers. Most who responded to a recent customer survey conducted by the Cyber Essentials Certification Body, chose the company because of recommendation or reputation. Indelible Data has passed more than 1500 submissions since the Government launched the …

Tips on passing Cyber Essentials first time

By Jason McNicholas Cyber Essentials assessor Important note: As of 1st April 2020 the Cyber Essentials Scheme changed structure and there is now only one NCSC Trusted Partner (IASME) coordinating Certification Bodies and other Cyber Essentials realated activities. For a comprehensive guide to passing first time using the IASME questionnaire, please see our updated companion …