Tips on getting documentation right for ISO 27001 certification

By Hannah Kelly Cyber Security Technologist When aiming to achieve your ISO 27001 certification, it is important to know what common pitfalls you can fall prey to, so you can effectively avoid them. There are some commonplace “hiccups” that could lead to unnecessary delays in your certification. Below, are three areas look out for:  Ensure any documentation is recorded …

Cyber Essentials Certification – getting the answers right

Indelible Data offers a range of packages for Cyber Essentials certification. By Cyber Essentials assessor Euan Henderson This document is a cut-down version of Indelible Data’s Cyber Essentials guide targeting some of the most common clarifications and how to avoid them. *** Update 27/02/2023: Responses to A2.4 and A2.6 no longer require the inclusion of …

Cyber Essentials Certification Body exceeds 2500 certificates

Indelible Data offers a range of packages for Cyber Essentials certification.   Indelible Data has issued 2500 Cyber Essentials certificates since the launch of the government scheme, establishing it as one of the most successful Cyber Essentials Certification Bodies in the UK. Demand for certification has not slowed during lockdown, suggesting companies are prioritising cyber …

Cyber Essentials Plus checklist for remote testing

This Cyber Essentials Plus checklist helps you through the remote testing process. Due to the pandemic, we are performing most of our assessments remotely. This requires a structured approach so nothing is missed. (Please note that further details are sent to you on acceptance of the Cyber Essentials Plus quote). Before reading this checklist, we …

Business is brisk for vaccine scammers

By Hannah Kelly Cyber Security Technologist COVID scammers posing as the NHS are targeting people via text and offering the vaccine for cash. The texts are also offering recipients the chance to register for vaccination, which is catching people out especially the elderly and vulnerable. The NHS would never ask or require you to prove …

Home working and the risks of mobile devices

By Euan Henderson Cyber Security Technologist The use of staff-owned devices for work has become more common during the Pandemic. As many organisations see the switch to home working as permanent and are letting office tenancies lapse, a robust approach must be taken to the security of Bring Your Own Devices (BYOD). Home working brings …

Vulnerabilities that cause Cyber Essentials Plus failure

By Jason McNicholas Cyber Essentials Assessor During Cyber Essentials Plus Audits we’re often asked the question “How is it decided which vulnerabilities are a fail and which ones are not?”. To decide this, we use the CVSS v3.0 metrics and score provided for the vulnerabilities. The first thing to be checked is the score, if …

COVID 19 Test and Trace ‘breaking’ privacy law

By Euan Henderson Cyber security apprentice The Department of Health has confirmed its Test and Trace initiative to combat COVID 19 was launched without an assessment of the impact on Privacy being carried out. The Open Rights Group (ORG) claims this means the initiative, launched in May, is unlawful. The Government has defended the scheme …

Changes to two-factor authentication

By Euan Henderson Cyber Security Apprentice Google has recently changed its default two-factor settings from SMS to device-based prompts. This change was implemented in July in the hope of preventing the exploits currently available, such as SIM cloning and social engineering, to gain access to the code. The change could minimise these attacks as it …

Act now – emergency update for Windows 10

By Euan Henderson Cyber Security Apprentice Microsoft has released two out-of-band security updates as an emergency update after two remote code execution vulnerabilities were found within the Windows Codecs Library. Both CVE-2020-1425 and CVE-2020-1457 warn of a large image file that is maliciously crafted and, due to how the Windows Codecs Library handles objects in …