It is a while since I have highlighted Android malware – TrickMo attracted my attention for the simplicity of just imitating lock screens to steal your information. TrickMo malware steals Android PINs using fake lock screen (bleepingcomputer.com) But the malware does not stop there it among the malicious tasks it …
A Real-World Example – BYOD A Primer (pt.3)
I did promise you that today I would make a start on what a BYOD (Bring-Your-Own-Device) policy would look like. However, regular readers will know I can get distracted easily… The distraction this time came from one of our members of staff who reminded me that we developed a BYOD …
Continue reading “A Real-World Example – BYOD A Primer (pt.3)”
BYOD – Where do you start? (pt.2)
After a short wait… (Another thing about phishing emails… (pt.12) and Problems with QR Codes here is the second part of my series on BYOD – Bring-Your-Own-Device. Trust and BYOD If you are or are thinking of allowing your team to use their devices to do your work – then …
BYOD Bring-Your-Own-Device – A Primer (pt.1)
This is a short series looking at the basics, the benefits and the risks of Bring-Your-Own-Device or BYOD. Today we are going to look at the most useful benefits. Defining BYOD Let’s start with a definition of what BYOD – Bring-Your-Own-Device is. To qualify, a device must be owned by …
Continue reading “BYOD Bring-Your-Own-Device – A Primer (pt.1)”
Information Security in the Office (pt.3)
This is part 3 of a short series looking at information security in the office – here are links to part 1 and 2. Information Security in the Office (pt.1) The Printer is the Issue Information Security in the Office (pt.2) Forgotten Technology Today we are going to look at …
Continue reading “Information Security in the Office (pt.3)”