Cyber threats looming in 2025

This year Cyber Essentials celebrated  it’s 10th birthday and the scheme has never been more important writes assessor Tyson McGuirk. Notably, 2024 has seen Artificial Intelligence continue to dominate the headlines, and not without good reason. The speed with which this new technology has developed can make it hard to keep up! AI can now …

Stay safe from cyber threats this Christmas

Christmas time brings joy, celebration, and an uptick in online shopping and digital activity.  Unfortunately, it also marks a peak time for cyber criminals looking to exploit the festive rush as Marketing Co-ordinator Abbey Wright explains. Here’s a deep dive into common cyber threats during Christmas and practical ways to protect yourself. Phishing emails are …

Tell me about cyber liability insurance that comes with Cyber Essentials certification

Who gets insurance with Cyber Essentials? Organisations that get certified to Cyber Essentials will automatically be entitled to cyber insurance if they certify their entire organisation, are domiciled in the UK or Crown Dependencies, and their annual turnover is under £20m. How to obtain the insurance?  As part of the certification process, the applicant is …

How VLANs can help you achieve Cyber Essentials compliance

When undergoing a Cyber Essentials assessment, businesses may need to ensure that certain devices are restricted from the assessment’s scope writes Assessor James Galbraith. This is generally done when there is a business requirement to use an unsupported application, or an unsupported operating system. Within Cyber Essentials this is called a sub-set, and the most …

Built-in mobile phone security to thwart street thefts and protect company data

Street thefts of mobile phones rocketed by 150% in the past year compromising the corporate data of thousands of companies, writes marketing co-ordinator Abbey Wright. While access to company emails on the move is a requirement for most employees, many firms are not taking the right steps to safeguard their information. We highly recommend protecting …

Charities get Cybers Essentials at a discount during October

Charities can buy Cyber Essentials at a £75 discount from Indelible Data during October. Charities month aims to educate the charities sector about the level of threat faced on a daily basis and is also supported by IASME, the Government’s Cyber Essentials partner. Around a third of charities suffered a cyber security breach or attack …

Latest update for Cyber Essentials – Willow questionnaire from April 2025

By James Galbraith, Cyber Essentials Assessor There will be some important changes with the release of the Cyber Essentials Willow question set in April 2025 which can be downloaded here. The government partner IASME, in consultation with Certification Bodies including Indelible Data, conducts an annual review of the scheme. Notable changes will occur in the …

Secure Your Mac: Meet Cyber Essentials Password Standards

This guide will walk you through the steps to configure your Mac’s passwords to meet Cyber Essentials compliance standards. Utilising the pwpolicy Tool Apple provides a powerful command-line tool, “pwpolicy,” to manage password requirements on your Mac. This tool allows you to customise various aspects of password complexity, such as: Minimum Password Length: Setting a …

Privacy concerns swirl around Microsoft’s new AI-Powered tool

sensitive information you’d prefer not to share writes Cyber Security Technologist James Galbraith. CoPilot is an AI-powered tool that co-ordinates content between Microsoft applications. It includes a feature called Recall. What are the privacy concerns surrounding the ‘Recall’ feature? There are privacy concerns regarding the Recall feature since it was launched in May. One of …

ThreatSure – Designed to be your ally in the boardroom

Do you crave an ally in the boardroom when arguing the case for more spending on cyber security? Threatsure delivers effective, affordable results that will highlight your vulnerabilities including missing patches; open ports and weak passwords. “Companies are looking for a cost-effective solution they can trust and we have designed this service to provide that,” …