After a short wait… (Another thing about phishing emails… (pt.12) and Problems with QR Codes here is the second part of my series on BYOD – Bring-Your-Own-Device. Trust and BYOD If you are or are thinking of allowing your team to use their devices to do your work – then …
BYOD Bring-Your-Own-Device – A Primer (pt.1)
This is a short series looking at the basics, the benefits and the risks of Bring-Your-Own-Device or BYOD. Today we are going to look at the most useful benefits. Defining BYOD Let’s start with a definition of what BYOD – Bring-Your-Own-Device is. To qualify, a device must be owned by …
Continue reading “BYOD Bring-Your-Own-Device – A Primer (pt.1)”
Information Security in the Office (pt.3)
This is part 3 of a short series looking at information security in the office – here are links to part 1 and 2. Information Security in the Office (pt.1) The Printer is the Issue Information Security in the Office (pt.2) Forgotten Technology Today we are going to look at …
Continue reading “Information Security in the Office (pt.3)”
Forced Upgrades
It is nothing new for me to say that patches and upgrades are an essential step in any organisation’s cyber security plan. Threat actors actively go after any system that has a weakness as soon as they know about it – many times before a vendor even knows there is …
Mobile phone thefts
I have discussed your organisation’s information on an employee’s mobile phone as part of my Devices and Cyber Security Primer – and a BYOD policy is something, I find most organisations have. However, I have also found it is also one of the most ignored policies. This is why it …