I am a great advocate of clients using encryption to enhance their cyber security and I have written a number of articles explaining how encryption is an easy cyber security step to implement. Here are a couple of them: In Support of Encryption Email Encryption I also think encryption is …
Only for grown-ups – Privacy Issues
I have an article published on CyberAwake today looking at social media and app privacy. Social Media and Privacy – CyberAwake Remember that good privacy can lead to good cyber security. If you keep something a secret then it makes it that much harder for a threat actor to attack. …
Bring Your Own Device (BYOD) – A Primer
It is so easy for an organisation to just let their staff use their own devices – it can save a lot of expense – but no organisation should let BYOD “just” happen. This series will help you understand what BYOD has to be a choice benefiting both the organisation …
I love it when a plan comes together…
My recently completed Back to Basics BYOD Primer has been neatly incorporated into my soon the be completed Insider Threat Primer: Insider Threat and BYOD (pt.6) – CyberAwake If you need to get up to speed with either topic then these Primers will answer many of the starting questions to …
Your BYOD Policy – Keeping the Paperwork Straight (pt.6)
So, you have decided that Bring Your Own Device (BYOD) is something that you can work with – rather than something that is just happening around you. You have sat down and thought about what could be done on your employees’ devices to improve the operations, to make life easier …
Continue reading “Your BYOD Policy – Keeping the Paperwork Straight (pt.6)”