Having to discuss the insider threat with clients is always difficult – they are always already trusting someone (even if they do not think so) and I am calling that trust into doubt. My reports and discussions always include the statement “monitoring what your team does with your information and …
When paperwork is paperwork!
Last week I wrote about the paperwork associated with a well-run BYOD project and policy. Although I spoke about paperwork in reality – except for that copy on the office shelf – the paperwork is probably just a collection of M365 and PDF files, saved in the cloud. However, sometimes …
I love it when a plan comes together…
My recently completed Back to Basics BYOD Primer has been neatly incorporated into my soon the be completed Insider Threat Primer: Insider Threat and BYOD (pt.6) – CyberAwake If you need to get up to speed with either topic then these Primers will answer many of the starting questions to …
Realistic Cyber Security
The Wednesday Bit is still on holiday! A couple of weeks back, whilst walking in Scotland, I got involved with a prospective client in a discussion about the benefits of our cyber security stack and in particular our Security Operations Centre. The discussion was not about “how much” but what …
Back-to-Basics – The Collection III
Having come back from a week’s holiday, I have been busy catching up, so this week the Wednesday Bit about reminding you about my collection of Back-to-Basics cyber security primers. Why am I doing this? Because we can all benefit from some cyber security training, whatever our level of expertise. The articles …