My recently completed Back to Basics BYOD Primer has been neatly incorporated into my soon the be completed Insider Threat Primer: Insider Threat and BYOD (pt.6) – CyberAwake If you need to get up to speed with either topic then these Primers will answer many of the starting questions to …
Your BYOD Policy – Keeping the Paperwork Straight (pt.6)
So, you have decided that Bring Your Own Device (BYOD) is something that you can work with – rather than something that is just happening around you. You have sat down and thought about what could be done on your employees’ devices to improve the operations, to make life easier …
Continue reading “Your BYOD Policy – Keeping the Paperwork Straight (pt.6)”
Apple Patches
Apple has issued two patches for vulnerabilities that are currently being exploited by threat actors: Apple Fixes Two Exploited Vulnerabilities – SANS Internet Storm Center As always check these have been done especially for any device that used for “BYOD” with your information. Othe news on Apple updates Recently Apple …
More on IoT and Cyber Security
On Tuesday I wrote about how unsecured and unsupported Internet of Things (IoT) device on an organisation’s network can compromise their cyber security and how an IT and Cyber Security Audit can help identify these issues before they become an “incident”. Another aspect of poor cyber security of internet connected …
IT and Cyber Security Audit
Many business owners are uncertain about what is involved in an IT and Cyber Security Audit or whether it is even necessary, particularly if their business is small. Value for money is crucial, and an audit can seem expensive. However, no business is too small to be a target for …