The second part of my Back-to-Basics series looking at the cyber security risks and actions associated with the insider threat has been published today on CyberAwake. The Insider threat – Start thinking about sorting. (pt.2) – CyberAwake Did you miss part one? Not a problem: The Insider threat – Not …
Another thing about phishing emails… (pt.12)
A few months ago, I wrote a Back-to-Basics mini-series on phishing emails, how they impact organisations and what you can do to reduce the risks. Back-to-Basics – A Phishing Email Primer | Smart Thinking Solutions Phish Attacks – the deluge never stops Every week I read articles on the latest …
Continue reading “Another thing about phishing emails… (pt.12)”
Stuff happens
On September 4, Tewkesbury Borough Council declared a major IT incident and shut down its systems and enacted their incident response plan. It now turns out that this incident was not a cyber-attack but an error in user accounts. However this does not matter. There was and is inconvenience to …
Who do you trust? A new mini-series.
I have started a new mini-series over on CyberAwake looking at the Insider Threat. The Insider Threat – Not just a question of trust. (pt.1) The first part is setting the scene, before we start looking for defences.
BYOD Bring-Your-Own-Device – A Primer (pt.1)
This is a short series looking at the basics, the benefits and the risks of Bring-Your-Own-Device or BYOD. Today we are going to look at the most useful benefits. Defining BYOD Let’s start with a definition of what BYOD – Bring-Your-Own-Device is. To qualify, a device must be owned by …
Continue reading “BYOD Bring-Your-Own-Device – A Primer (pt.1)”