Over the past few weeks, I have been writing about privacy for CyberAwake – I have linked the articles below – and at the same time, I was reading up on encryption for an article here last week on the value of encryption – Encryption or Not Encryption. Both sets …
Encryption or Not Encryption
I am a great advocate of clients using encryption to enhance their cyber security and I have written a number of articles explaining how encryption is an easy cyber security step to implement. Here are a couple of them: In Support of Encryption Email Encryption I also think encryption is …
Only for grown-ups – Privacy Issues
I have an article published on CyberAwake today looking at social media and app privacy. Social Media and Privacy – CyberAwake Remember that good privacy can lead to good cyber security. If you keep something a secret then it makes it that much harder for a threat actor to attack. …
Bring Your Own Device (BYOD) – A Primer
It is so easy for an organisation to just let their staff use their own devices – it can save a lot of expense – but no organisation should let BYOD “just” happen. This series will help you understand what BYOD has to be a choice benefiting both the organisation …
I love it when a plan comes together…
My recently completed Back to Basics BYOD Primer has been neatly incorporated into my soon the be completed Insider Threat Primer: Insider Threat and BYOD (pt.6) – CyberAwake If you need to get up to speed with either topic then these Primers will answer many of the starting questions to …