Does my business need Cyber Essentials?

Cyber Essentials helps keep businesses secure through the assessment of five controls: The use and proper configuration of firewalls The implementation of secure settings for devices and software The use of access control management The implementation of antimalware software and other methods The configuration of automatic updates for devices and software The certification is designed …

Bring your own device securely

By Euan Henderson Cyber Security Technologist As more employees use their own devices for work, it’s crucial to ensure that company data is only accessed from secure business-approved applications. An employee may choose to use a new application to access company data if their existing application is not user friendly. Even though this is being …

Companies urged to be vigilant as tensions between Russia and the Ukraine bring cyber threat

By Jason McNicholas, Lead Cyber Technician and Tony Wilson, Managing Director Indelible Data is urging companies to be vigilant in light of rising tensions between Russia and the Ukraine. As history has shown from previous attacks on the Ukraine, third party collateral damage to UK companies is inevitable. Indelible Data therefore recommends companies of any …

Home working and the risks of mobile devices

By Euan Henderson Cyber Security Technologist The use of staff-owned devices for work has become more common during the Pandemic. As many organisations see the switch to home working as permanent and are letting office tenancies lapse, a robust approach must be taken to the security of Bring Your Own Devices (BYOD). Home working brings …

Are those old disk drives really clean?

By Euan Henderson Cyber Security Apprentice The sanitisation of storage media is important for the security of data within a company.   Disk sanitation may be required for many reasons such as the re-use of the storage media, the repair of the storage media, the disposal and the destruction of media.   If storage media is not sanitised correctly before …

Are Office Macros posing an unnecessary threat?

By Euan Henderson Cyber security Apprentice The NCSC has released new advice for Macros. Last year it was reported that nearly half of detected malware deliveries were due to Office Macros. The guidance offered, advises that organisations begin to implement controls that are designed to mitigate risk posed by Macros. On MacOS, it is recommended …

Email security: guarding against the expected

By Euan Henderson Cyber Security Apprentice In order to secure an organisation’s emails, TLS should be enabled as best practice. TLS stands for Transport Layer Security and is a security protocol that encrypts and authenticates data between services/applications and the end users. TLS v1.1 is not considered safe, so ensure that you use v1.2 wherever …

Securing the Supply Chain

Following just 12 principles is enough to secure supply chains to meet the assurance demands of today’s customers. The principles were published as guidance by NCSC to help establish effective control and oversight of supply chains. You must understand the risks before establishing control then checking arrangements and putting in place what is required for …

Remote working: Great for some but a Cyber headache for others

By Euan Henderson Cyber Security Apprentice Using remote working solutions may make it easier for employees to collaborate but with it come new risks. These risks come in many forms and a few examples include password spraying (a term to describe attackers trying to log into multiple accounts using a single password) and phishing to …