390,000 WordPress Account Credentials Stolen

A hacking group known as “MUT-1244” has stolen more than 390,000 WordPress account credentials in a long-term campaign that targeted security professionals and malicious actors. MUT-1244 spread an infected credential checker among the information security community along with other tools hosted on GitHub write Cyber Security Technologist James Galbraith. This attack specifically targeted penetration testers …

Cyber security Highlights: Major Incidents in January 2025

The cyber security world kicked off 2025 with a series of high-profile incidents and vulnerabilities as marketing co-ordinator Abbey Wright discovered. From data breaches to sophisticated malware removal, here’s a breakdown of the month’s most significant stories and what they mean for your organisation.   Scholastic Data Breach Exposes Millions Over 4 million users had …

Cyber threats looming in 2025

This year Cyber Essentials celebrated  it’s 10th birthday and the scheme has never been more important writes assessor Tyson McGuirk. Notably, 2024 has seen Artificial Intelligence continue to dominate the headlines, and not without good reason. The speed with which this new technology has developed can make it hard to keep up! AI can now …

Stay safe from cyber threats this Christmas

Christmas time brings joy, celebration, and an uptick in online shopping and digital activity.  Unfortunately, it also marks a peak time for cyber criminals looking to exploit the festive rush as Marketing Co-ordinator Abbey Wright explains. Here’s a deep dive into common cyber threats during Christmas and practical ways to protect yourself. Phishing emails are …

Tell me about cyber liability insurance that comes with Cyber Essentials certification

Who gets insurance with Cyber Essentials? Organisations that get certified to Cyber Essentials will automatically be entitled to cyber insurance if they certify their entire organisation, are domiciled in the UK or Crown Dependencies, and their annual turnover is under £20m. How to obtain the insurance?  As part of the certification process, the applicant is …

How VLANs can help you achieve Cyber Essentials compliance

When undergoing a Cyber Essentials assessment, businesses may need to ensure that certain devices are restricted from the assessment’s scope writes Assessor James Galbraith. This is generally done when there is a business requirement to use an unsupported application, or an unsupported operating system. Within Cyber Essentials this is called a sub-set, and the most …

Built-in mobile phone security to thwart street thefts and protect company data

Street thefts of mobile phones rocketed by 150% in the past year compromising the corporate data of thousands of companies, writes marketing co-ordinator Abbey Wright. While access to company emails on the move is a requirement for most employees, many firms are not taking the right steps to safeguard their information. We highly recommend protecting …

Charities get Cybers Essentials at a discount during October

Charities can buy Cyber Essentials at a £75 discount from Indelible Data during October. Charities month aims to educate the charities sector about the level of threat faced on a daily basis and is also supported by IASME, the Government’s Cyber Essentials partner. Around a third of charities suffered a cyber security breach or attack …

Latest update for Cyber Essentials – Willow questionnaire from April 2025

By James Galbraith, Cyber Essentials Assessor There will be some important changes with the release of the Cyber Essentials Willow question set in April 2025 which can be downloaded here. The government partner IASME, in consultation with Certification Bodies including Indelible Data, conducts an annual review of the scheme. Notable changes will occur in the …

Secure Your Mac: Meet Cyber Essentials Password Standards

This guide will walk you through the steps to configure your Mac’s passwords to meet Cyber Essentials compliance standards. Utilising the pwpolicy Tool Apple provides a powerful command-line tool, “pwpolicy,” to manage password requirements on your Mac. This tool allows you to customise various aspects of password complexity, such as: Minimum Password Length: Setting a …