7-step guide for you and your family after cyber attacks

By Indelible Data Managing Director Tony Wilson Your data has been involved in a cyber-attack – now what? Another day, another high profile hack. I can sympathise with anyone feeling overwhelmed by the sheer amount of cyber-related news at the moment so I’ve created a 7-step guide for you and your family after cyber attacks. …

CyberUK 2025 – Proactive resilience is key to business security

By Tony Wilson, Indelible Data Managing Director A key theme resonating throughout the NCSC’s flagship CyberUK event was “proactive resilience” with many speakers, and vendors, using the phrase “controlling the controllables” as the key to business security. The event brought together cyber security leaders, innovators, and policymakers to tackle the evolving threat landscape. Richard Horne …

April Cyber Security Wrap-up – exchange server deadline, Android 12 Support Ends & major breaches

April brought key cyber security shifts, from upcoming software deadlines to evolving compliance rules and serious data breaches. Here’s Marketing Coordinator Abbey Wright‘s review of what your business needs to know: Microsoft Exchange Server 2016/2019 reaches end of support in October Support for Microsoft Exchange Server 2016 and 2019 ends October 14, 2025. After this, …

March cyber security wrap-up: Major vulnerabilities, attacks & breaches

March has been a turbulent month in the world of cyber security, with multiple high-profile vulnerabilities, breaches, and cyber attacks making headlines – read marketing co-ordinator Abbey Wright’s review. From a critical flaw in Veeam Backup & Replication to a sophisticated zero-click attack on WhatsApp, let’s dive into the most pressing threats and their implications. …

Apple’s iCloud Backup Changes: Implications for User Privacy

Apple, a company often recognised for its commitment to user privacy, has recently modified its iCloud backup encryption practices, prompting concerns about data security as Cyber Security Technologist Chris McGee investigates. Previously, iCloud backups were protected by end-to-end encryption, meaning even Apple could not access the stored information. The current system raises the possibility of …

Cyber lowlights – here’s what made the cyber headlines in February

As February ends, we reflect on key cyber security events – from major breaches to government cyber operations – highlighting ongoing digital threats and the need for strong security, as Marketing Co-ordinator Abbey Wright found. Here’s what made the cyber headlines: Apple limits encrypted backup removal for UK users Apple has quietly removed the option …

390,000 WordPress Account Credentials Stolen

A hacking group known as “MUT-1244” has stolen more than 390,000 WordPress account credentials in a long-term campaign that targeted security professionals and malicious actors. MUT-1244 spread an infected credential checker among the information security community along with other tools hosted on GitHub write Cyber Security Technologist James Galbraith. This attack specifically targeted penetration testers …

Privacy concerns swirl around Microsoft’s new AI-Powered tool

sensitive information you’d prefer not to share writes Cyber Security Technologist James Galbraith. CoPilot is an AI-powered tool that co-ordinates content between Microsoft applications. It includes a feature called Recall. What are the privacy concerns surrounding the ‘Recall’ feature? There are privacy concerns regarding the Recall feature since it was launched in May. One of …

ThreatSure – Designed to be your ally in the boardroom

Do you crave an ally in the boardroom when arguing the case for more spending on cyber security? Threatsure delivers effective, affordable results that will highlight your vulnerabilities including missing patches; open ports and weak passwords. “Companies are looking for a cost-effective solution they can trust and we have designed this service to provide that,” …