This is a very good follow on article from – When hardware reaches EOL | Smart Thinking Solutions. Device cyber security is rarely taken seriously by organisations or individuals and it is really important when that device is connected to the internet, and what device today is not connected to …
When hardware reaches EOL
EOL – End of Life. With hardware this can mean that when the iPhone is dropped down the toilet or the laptop is dropped down the stairs, they have reached the end of their service life. But usually it is something more subtle – hardware reaches EOL when vendors stop …
Encryption – A Primer
Over the past couple of weeks, I have been writing a short series looking at the basics of encryption, how you can use it to improve your cyber security and some of the issues you need to address if you are using it. As I have done with other mini-series …
The Principle of Least Privilege and Authentication, Authorisation and Accountability – A Primer
Authentication, Authorisation and Accountability (AAA) and The Principle of Least Privilege (PoLP) come together in this primer to give you a basic understanding of the importance of knowing who is accessing your information and how much they can access. Another important idea covered here is what happens when something goes …
Keep It Simple… Encryption (pt. 4)
You use encryption to keep your information secret from unauthorised people – not from everyone. I am going to skip the basics of encryption here as I have covered it in parts 1-3, there are links to those articles at the end of this article. Today, having spent time telling …