On Tuesday I wrote about how unsecured and unsupported Internet of Things (IoT) device on an organisation’s network can compromise their cyber security and how an IT and Cyber Security Audit can help identify these issues before they become an “incident”. Another aspect of poor cyber security of internet connected …
IT and Cyber Security Audit
Many business owners are uncertain about what is involved in an IT and Cyber Security Audit or whether it is even necessary, particularly if their business is small. Value for money is crucial, and an audit can seem expensive. However, no business is too small to be a target for …
Your BYOD Policy – What? (pt.5)
Are you still onboard with Bring-Your-Own-Device (BYOD) as a tool to improve your organisation’s productivity and help make your team “happier”? Then today, I am going to give you something harder to think about. BYOD and Your Information Allowing one of your team to work on their own laptop is …
Your BYOD Policy – Where do you start? (pt.4)
I discuss policies with clients a lot. This includes just asking to see them when I start an IT and Cyber Security Audit or when I am booked to deliver some Cyber Security Awareness Training. I am never surprised when they do not exist or possibly even worse, “not fit …
Continue reading “Your BYOD Policy – Where do you start? (pt.4)”
Something a bit different
Johannes Ullrich who writes for Sans Internet Storm – I often quote his work here on Smart Thinking – lives in a part of America which recently has suffered several hurricanes. We talk about preparing for business continuity here – Johannes has written about it when you have to cope …