Many business owners are uncertain about what is involved in an IT and Cyber Security Audit or whether it is even necessary, particularly if their business is small. Value for money is crucial, and an audit can seem expensive. However, no business is too small to be a target for …
Two Russia Stories
The first article is about a Russian threat group – NoName057(16) – which has claimed it launched a number of DDoS attacks again UK local government websites: Pro-Russia hackers claim Greater Manchester council cyber attacks – BBC News The affected councils have reported that the functionality of their websites suffered …
Something a bit different
Johannes Ullrich who writes for Sans Internet Storm – I often quote his work here on Smart Thinking – lives in a part of America which recently has suffered several hurricanes. We talk about preparing for business continuity here – Johannes has written about it when you have to cope …
A Real-World Example – BYOD A Primer (pt.3)
I did promise you that today I would make a start on what a BYOD (Bring-Your-Own-Device) policy would look like. However, regular readers will know I can get distracted easily… The distraction this time came from one of our members of staff who reminded me that we developed a BYOD …
Continue reading “A Real-World Example – BYOD A Primer (pt.3)”
BYOD – Where do you start? (pt.2)
After a short wait… (Another thing about phishing emails… (pt.12) and Problems with QR Codes here is the second part of my series on BYOD – Bring-Your-Own-Device. Trust and BYOD If you are or are thinking of allowing your team to use their devices to do your work – then …