Taking Cyber Essentials to the next level – with our Platinum service

Our Platinum package is taking Cyber Essentials to the next level by combining Cyber Essentials Basic certification with 12 months external Vulnerability Scanning for the price of 10. Your Cyber Essentials certification will reassure customers that your company’s cyber security controls will protect against the vast majority of common online attacks. This is coupled with …

Apple’s iCloud Backup Changes: Implications for User Privacy

Apple, a company often recognised for its commitment to user privacy, has recently modified its iCloud backup encryption practices, prompting concerns about data security as Cyber Security Technologist Chris McGee investigates. Previously, iCloud backups were protected by end-to-end encryption, meaning even Apple could not access the stored information. The current system raises the possibility of …

Cyber lowlights – here’s what made the cyber headlines in February

As February ends, we reflect on key cyber security events – from major breaches to government cyber operations – highlighting ongoing digital threats and the need for strong security, as Marketing Co-ordinator Abbey Wright found. Here’s what made the cyber headlines: Apple limits encrypted backup removal for UK users Apple has quietly removed the option …

Tailoring Cyber Essentials to your company’s needs

Indelible Data offers a packaged approach tailoring Cyber Essentials to your company’s needs. The cost depends on company size and your package choice as Business Development Manager Georgia Routledge-Moore explains. How much does Cyber Essentials Basic certification cost? If you’re not sure where to start, our Gold package, priced from £510+VAT, offers our highest level …

390,000 WordPress Account Credentials Stolen

A hacking group known as “MUT-1244” has stolen more than 390,000 WordPress account credentials in a long-term campaign that targeted security professionals and malicious actors. MUT-1244 spread an infected credential checker among the information security community along with other tools hosted on GitHub write Cyber Security Technologist James Galbraith. This attack specifically targeted penetration testers …

Cyber security Highlights: Major Incidents in January 2025

The cyber security world kicked off 2025 with a series of high-profile incidents and vulnerabilities as marketing co-ordinator Abbey Wright discovered. From data breaches to sophisticated malware removal, here’s a breakdown of the month’s most significant stories and what they mean for your organisation.   Scholastic Data Breach Exposes Millions Over 4 million users had …

Cyber threats looming in 2025

This year Cyber Essentials celebrated  it’s 10th birthday and the scheme has never been more important writes assessor Tyson McGuirk. Notably, 2024 has seen Artificial Intelligence continue to dominate the headlines, and not without good reason. The speed with which this new technology has developed can make it hard to keep up! AI can now …

Stay safe from cyber threats this Christmas

Christmas time brings joy, celebration, and an uptick in online shopping and digital activity.  Unfortunately, it also marks a peak time for cyber criminals looking to exploit the festive rush as Marketing Co-ordinator Abbey Wright explains. Here’s a deep dive into common cyber threats during Christmas and practical ways to protect yourself. Phishing emails are …

Tell me about cyber liability insurance that comes with Cyber Essentials certification

Who gets insurance with Cyber Essentials? Organisations that get certified to Cyber Essentials will automatically be entitled to cyber insurance if they certify their entire organisation, are domiciled in the UK or Crown Dependencies, and their annual turnover is under £20m. How to obtain the insurance?  As part of the certification process, the applicant is …

How VLANs can help you achieve Cyber Essentials compliance

When undergoing a Cyber Essentials assessment, businesses may need to ensure that certain devices are restricted from the assessment’s scope writes Assessor James Galbraith. This is generally done when there is a business requirement to use an unsupported application, or an unsupported operating system. Within Cyber Essentials this is called a sub-set, and the most …