I have discussed your organisation’s information on an employee’s mobile phone as part of my Devices and Cyber Security Primer – and a BYOD policy is something, I find most organisations have. However, I have also found it is also one of the most ignored policies. This is why it …
Lost nearly everything!
I was reading about the hack of the international telecoms giant AT&T last week, but I noticed the headline of this article about it on the BBC today, that clearly sums up the hack. Hackers steal call records of ‘nearly all’ AT&T customers – BBC It is the ‘nearly all’ …
Encryption
For today’s Wednesday Bit, I want to rerun an article I first published in November last year. I was reminded about my article on encryption for two reasons… One of my current IT and Cyber Security Audits has highlighted an issue where very sensitive information is being shared in a …
Beyond belief…
I am sure many of you watched the drama about the Horizon Software fiasco, The Post Office, the muppet CEO and Mr Bates and it would have been impossible to miss the ongoing press coverage of the scandal. But then the Post Office did this: Post Office accidentally leaks names …
People always forget about the paper when it comes to cyber security!
Before we start – this article looks at the cyber security risk paper poses to an organisation: If you want evidence that paper is a cyber security problem you need to get to grips with, have a look at this article in the recent news: Student’s flimsy bin bags blamed …
Continue reading “People always forget about the paper when it comes to cyber security!”