The secure messaging app Signal has made the news recently with various members of the US Government using it to avoid accountability (possibly) and to inappropriately share their thoughts on secret operations with journalists and then the rest of the world (accually). I am a Signal user – I like …
The Insider Threat Primer
Having to discuss the insider threat with clients is always difficult – they are always already trusting someone (even if they do not think so) and I am calling that trust into doubt. My reports and discussions always include the statement “monitoring what your team does with your information and …
When paperwork is paperwork!
Last week I wrote about the paperwork associated with a well-run BYOD project and policy. Although I spoke about paperwork in reality – except for that copy on the office shelf – the paperwork is probably just a collection of M365 and PDF files, saved in the cloud. However, sometimes …
I love it when a plan comes together…
My recently completed Back to Basics BYOD Primer has been neatly incorporated into my soon the be completed Insider Threat Primer: Insider Threat and BYOD (pt.6) – CyberAwake If you need to get up to speed with either topic then these Primers will answer many of the starting questions to …
Mobile phone thefts
I have discussed your organisation’s information on an employee’s mobile phone as part of my Devices and Cyber Security Primer – and a BYOD policy is something, I find most organisations have. However, I have also found it is also one of the most ignored policies. This is why it …