Is it easy to pass Cyber Essentials?

Indelible Data offers a range of packages for Cyber Essentials certification. There is a common misconception that Cyber Essentials is an easy to pass ‘box ticking’ exercise that does not hold its value in relation to threats. In reality, the certification can be challenging for those that are unprepared or have minimal IT support, writes …

Cyber Essentials Montpellier – What You Need To Know

The much-anticipated Montpellier release of the Cyber Essentials questionnaire has arrived, and now we’ve had time to assess its merits, our Lead Assessor, Tony Wilson, will guide you through additions, relaxations, and even changes that affect responses to the current Evendine questionnaire to pave the way to Montpellier on April 24th 2023.  Montpellier is the …

Update from LastPass on 2022 breach?

Two months on… should we still be worried about the LastPass breach? Over the Christmas period, popular password manager LastPass announced that hackers had gained access to customer’s password vaults writes Tyson McGuirk. This follows on from an attack in August 2022 where access was gained to a developer account. It is believed information obtained …

Cyber Essentials challenge for Special Educational Needs schools

Indelible Data offers a range of packages for Cyber Essentials certification.   Cyber Essentials can be a challenging certification to achieve for schools that operate Special Educational Needs (SEN) facilities explains Aidan Collins. With limited public guidance for SEN schools relating to Cyber Essentials, the following blog aims to help those who may have concerns …

It’s a new cyber frontier for Tyson

IT’S like a new frontier with a million opportunities says Indelible Data’s newest cyber recruit on joining the business. The expanding company interviewed hopefuls from across the UK to find its latest cyber security candidate but found Tyson McGuirk just a few miles away from its Maryport headquarters. The 23-year-old from Harrington, Cumbria moved from …

Your smart phone could be a target – follow our advice to avoid being a victim

In late October it was reported that during Liz Truss’s tenure as foreign secretary her smart phone was hacked, allegedly by Russian intelligence forces, writes Cyber Security apprentice Tom Boughton. Sensitive information relating to Liz Truss and the UK Government, including private conversations between herself and other politicians such as Boris Johnson and Kwasi Kwarteng, …

More time given to meet Cyber Essentials Evendine controls

Indelible Data offers a range of packages for Cyber Essentials certification.   In January 2022, the NCSC overhauled the Cyber Essentials scheme with more comprehensive controls and as Cyber Security apprentice Thomas Boughton explains, applicants have been given more time to meet the new requirements. These controls related to in-scope thin client devices, the segregation …

Internet Explorer 11 causing Cyber Essentials Plus failure

Indelible Data offers a range of packages for Cyber Essentials certification. Internet Explorer has reached its end-of-life date and all organisations should ensure it is removed to help protect their systems, and avoid failing Cyber Essentials Plus says Euan Henderson – Cyber Technologist and Cyber Essentials assessor If an unsupported installation is found during a Cyber …

Building a cyber secured construction sector

By Aidan Collins Cyber Security Apprentice Latest guidance from the National Cyber Security Centre (NCSC), in partnership with the Chartered Institute of Building (CIOB),  highlights common cyber security threats to the construction sector. Due to the increasing modernisation of the once analogue construction industry, particularly small to medium sized construction companies are being targeted with …

Should I choose a Penetration Test or Vulnerability Scan?

By Tony Wilson Cyber Scheme Team Leader Key differences between a Vulnerability Scan and a Penetration Test. We are often asked why penetration tests are conducted when there are “scanning vendors” claiming they can perform a weekly automated penetration tests at a fraction of the cost. There is a glaring mistake in this claim, namely, …