Are you still onboard with Bring-Your-Own-Device (BYOD) as a tool to improve your organisation’s productivity and help make your team “happier”? Then today, I am going to give you something harder to think about. BYOD and Your Information Allowing one of your team to work on their own laptop is …
Apple Updates
Microsoft’s Patch Tuesday is featured here every month – it is important part of everyone’s cyber security. Apple’s updates however are not always on a certain day but they are as important. All the current operating systems receive updates to patch a total of 67 vulnerabilities, with older operating systems …
Your BYOD Policy – Where do you start? (pt.4)
I discuss policies with clients a lot. This includes just asking to see them when I start an IT and Cyber Security Audit or when I am booked to deliver some Cyber Security Awareness Training. I am never surprised when they do not exist or possibly even worse, “not fit …
Continue reading “Your BYOD Policy – Where do you start? (pt.4)”
Tricky Android Malware
It is a while since I have highlighted Android malware – TrickMo attracted my attention for the simplicity of just imitating lock screens to steal your information. TrickMo malware steals Android PINs using fake lock screen (bleepingcomputer.com) But the malware does not stop there it among the malicious tasks it …
A Real-World Example – BYOD A Primer (pt.3)
I did promise you that today I would make a start on what a BYOD (Bring-Your-Own-Device) policy would look like. However, regular readers will know I can get distracted easily… The distraction this time came from one of our members of staff who reminded me that we developed a BYOD …
Continue reading “A Real-World Example – BYOD A Primer (pt.3)”