Apple has issued two patches for vulnerabilities that are currently being exploited by threat actors: Apple Fixes Two Exploited Vulnerabilities – SANS Internet Storm Center As always check these have been done especially for any device that used for “BYOD” with your information. Othe news on Apple updates Recently Apple …
Apple Updates
Microsoft’s Patch Tuesday is featured here every month – it is important part of everyone’s cyber security. Apple’s updates however are not always on a certain day but they are as important. All the current operating systems receive updates to patch a total of 67 vulnerabilities, with older operating systems …
BYOD – Where do you start? (pt.2)
After a short wait… (Another thing about phishing emails… (pt.12) and Problems with QR Codes here is the second part of my series on BYOD – Bring-Your-Own-Device. Trust and BYOD If you are or are thinking of allowing your team to use their devices to do your work – then …
Of course they would brand AI “Apple Intelligence”!
Having decided not to buy the latest Apple iPhone – my iPhone 14 Pro Max is still doing a great job, even though I would like a some of the new iPhone camera features – here is an article from The Conversation looking at AI – Artificial Intelligence – and …
Continue reading “Of course they would brand AI “Apple Intelligence”!”
BYOD Bring-Your-Own-Device – A Primer (pt.1)
This is a short series looking at the basics, the benefits and the risks of Bring-Your-Own-Device or BYOD. Today we are going to look at the most useful benefits. Defining BYOD Let’s start with a definition of what BYOD – Bring-Your-Own-Device is. To qualify, a device must be owned by …
Continue reading “BYOD Bring-Your-Own-Device – A Primer (pt.1)”