Skip to content
Smart Thinking Solutions Cyber Essentials Certified

Smart Thinking Solutions

Cybersecurity Starts in the Boardroom

  • Home
  • Services
  • Contact Us
  • Clive Catton
  • Newsletters
  • Free eBook
  • Search

Tag: device security

Posted on 17 October 202417 October 2024

Tricky Android Malware

It is a while since I have highlighted Android malware – TrickMo attracted my attention for the simplicity of just imitating lock screens to steal your information. TrickMo malware steals Android PINs using fake lock screen (bleepingcomputer.com) But the malware does not stop there it among the malicious tasks it …

Continue reading “Tricky Android Malware”

Posted on 16 October 202416 October 2024

A Real-World Example – BYOD A Primer (pt.3)

BYOD Bring-Your-Own-Device means lots of devices

I did promise you that today I would make a start on what a BYOD (Bring-Your-Own-Device) policy would look like. However, regular readers will know I can get distracted easily… The distraction this time came from one of our members of staff who reminded me that we developed a BYOD …

Continue reading “A Real-World Example – BYOD A Primer (pt.3)”

Posted on 9 October 20249 October 2024

BYOD – Where do you start? (pt.2)

BYOD has benefits for employees

After a short wait… (Another thing about phishing emails… (pt.12) and Problems with QR Codes here is the second part of my series on BYOD – Bring-Your-Own-Device. Trust and BYOD If you are or are thinking of allowing your team to use their devices to do your work – then …

Continue reading “BYOD – Where do you start? (pt.2)”

Posted on 18 September 202417 September 2024

BYOD Bring-Your-Own-Device – A Primer (pt.1)

bring-your-own-device BYOD

This is a short series looking at the basics, the benefits and the risks of Bring-Your-Own-Device or BYOD. Today we are going to look at the most useful benefits. Defining BYOD Let’s start with a definition of what BYOD – Bring-Your-Own-Device is. To qualify, a device must be owned by …

Continue reading “BYOD Bring-Your-Own-Device – A Primer (pt.1)”

Posted on 10 September 202410 September 2024

Forced Upgrades

It is nothing new for me to say that patches and upgrades are an essential step in any organisation’s cyber security plan. Threat actors actively go after any system that has a weakness as soon as they know about it – many times before a vendor even knows there is …

Continue reading “Forced Upgrades”

Posts pagination

Previous page Page 1 … Page 3 Page 4 Page 5 … Page 8 Next page

Smart Thinking Solutions is a trading name of Octagon Technology Ltd. ©  2021 Octagon Technology Ltd

Smart Thinking Solutions supports Let's stop abuse together

Privacy Policy  Cookie Policy  1000 posts  Sign up to our Newsletter Proudly powered by WordPress
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
CookieDurationDescription
CONSENT16 years 3 months 3 days 14 hours 29 minutesYouTube sets this cookie via embedded youtube-videos and registers anonymous statistical data.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
CookieDurationDescription
IDE1 year 24 daysGoogle DoubleClick IDE cookies are used to store information about how the user uses the website to present them with relevant ads and according to the user profile.
test_cookie15 minutesThe test_cookie is set by doubleclick.net and is used to determine if the user's browser supports cookies.
VISITOR_INFO1_LIVE5 months 27 daysA cookie set by YouTube to measure bandwidth that determines whether the user gets the new or old player interface.
YSCsessionYSC cookie is set by Youtube and is used to track the views of embedded videos on Youtube pages.
yt-remote-connected-devicesneverYouTube sets this cookie to store the video preferences of the user using embedded YouTube video.
yt-remote-device-idneverYouTube sets this cookie to store the video preferences of the user using embedded YouTube video.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
CookieDurationDescription
cookielawinfo-checkbox-functional1 yearThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
SAVE & ACCEPT
Powered by CookieYes Logo