After a short wait… (Another thing about phishing emails… (pt.12) and Problems with QR Codes here is the second part of my series on BYOD – Bring-Your-Own-Device. Trust and BYOD If you are or are thinking of allowing your team to use their devices to do your work – then …
BYOD Bring-Your-Own-Device – A Primer (pt.1)
This is a short series looking at the basics, the benefits and the risks of Bring-Your-Own-Device or BYOD. Today we are going to look at the most useful benefits. Defining BYOD Let’s start with a definition of what BYOD – Bring-Your-Own-Device is. To qualify, a device must be owned by …
Continue reading “BYOD Bring-Your-Own-Device – A Primer (pt.1)”
The cyber security risk of end-of-life products.
I have come across the issue of EoL products being used several times whilst carrying out IT and Cyber Security Audits. Often the client has no idea that the firewall or internet connected printer they are relying on is no longer supported by the manufacturer. I have written about this …
Continue reading “The cyber security risk of end-of-life products.”
It looks like being a week of device security – these numbers should convince you to do something
I have written about the risks of Android apps – a lot, see the highlights of the issue here: Device Security (Pt. 2) | Smart Thinking Solutions However to reinforce the statement that apps downloaded from the Google Play Store can be a serious security risk on your organisation’s information, …
I have an LG TV!
Researchers at BitDefender have discovered cyber security flaws in WebOS, the operating system used in LG smart TVs. Over 90,000 LG Smart TVs may be exposed to remote attacks (bleepingcomputer.com) I manual ran a software update on my TV to ensure it is running the latest secure version of WebOS. …