As part of an ongoing IT and Cyber Security Audit, I had several meetings this week to advise a client on how to migrate their current bespoke website to WordPress. These meetings included how to find a good WordPress developer and the standard of cyber security they should demand for …
A Real-World Example – BYOD A Primer (pt.3)
I did promise you that today I would make a start on what a BYOD (Bring-Your-Own-Device) policy would look like. However, regular readers will know I can get distracted easily… The distraction this time came from one of our members of staff who reminded me that we developed a BYOD …
Continue reading “A Real-World Example – BYOD A Primer (pt.3)”
BYOD – Where do you start? (pt.2)
After a short wait… (Another thing about phishing emails… (pt.12) and Problems with QR Codes here is the second part of my series on BYOD – Bring-Your-Own-Device. Trust and BYOD If you are or are thinking of allowing your team to use their devices to do your work – then …
Password Rules
Not for you but for developers and programmers. I they do not set effective password parameters then it can be too easy for a user to take a shortcut to a poor password and poor cyber security. NIST Recommends Some Common-Sense Password Rules – Schneier on Security Your Takeaway If …
Problems with QR Codes
Diana has written this week’s “Wednesday Bit” on QR Codes. Last week I became aware of a significant problem with QR codes, which are used by many organisations and individuals to direct people to their websites or sales pages. Such codes have been in use now for many years. (BizTechReports, …