Bring your own device securely

By Euan Henderson Cyber Security Technologist As more employees use their own devices for work, it’s crucial to ensure that company data is only accessed from secure business-approved applications. An employee may choose to use a new application to access company data if their existing application is not user friendly. Even though this is being …

Companies urged to be vigilant as tensions between Russia and the Ukraine bring cyber threat

By Jason McNicholas, Lead Cyber Technician and Tony Wilson, Managing Director Indelible Data is urging companies to be vigilant in light of rising tensions between Russia and the Ukraine. As history has shown from previous attacks on the Ukraine, third party collateral damage to UK companies is inevitable. Indelible Data therefore recommends companies of any …

Home working and the risks of mobile devices

By Euan Henderson Cyber Security Technologist The use of staff-owned devices for work has become more common during the Pandemic. As many organisations see the switch to home working as permanent and are letting office tenancies lapse, a robust approach must be taken to the security of Bring Your Own Devices (BYOD). Home working brings …

Are those old disk drives really clean?

By Euan Henderson Cyber Security Apprentice The sanitisation of storage media is important for the security of data within a company.   Disk sanitation may be required for many reasons such as the re-use of the storage media, the repair of the storage media, the disposal and the destruction of media.   If storage media is not sanitised correctly before …

Email security: guarding against the expected

By Euan Henderson Cyber Security Apprentice In order to secure an organisation’s emails, TLS should be enabled as best practice. TLS stands for Transport Layer Security and is a security protocol that encrypts and authenticates data between services/applications and the end users. TLS v1.1 is not considered safe, so ensure that you use v1.2 wherever …

Securing the Supply Chain

Following just 12 principles is enough to secure supply chains to meet the assurance demands of today’s customers. The principles were published as guidance by NCSC to help establish effective control and oversight of supply chains. You must understand the risks before establishing control then checking arrangements and putting in place what is required for …