After a short wait… (Another thing about phishing emails… (pt.12) and Problems with QR Codes here is the second part of my series on BYOD – Bring-Your-Own-Device. Trust and BYOD If you are or are thinking of allowing your team to use their devices to do your work – then …
BYOD Bring-Your-Own-Device – A Primer (pt.1)
This is a short series looking at the basics, the benefits and the risks of Bring-Your-Own-Device or BYOD. Today we are going to look at the most useful benefits. Defining BYOD Let’s start with a definition of what BYOD – Bring-Your-Own-Device is. To qualify, a device must be owned by …
Continue reading “BYOD Bring-Your-Own-Device – A Primer (pt.1)”
Information Security in the Office (pt.3)
This is part 3 of a short series looking at information security in the office – here are links to part 1 and 2. Information Security in the Office (pt.1) The Printer is the Issue Information Security in the Office (pt.2) Forgotten Technology Today we are going to look at …
Continue reading “Information Security in the Office (pt.3)”
Back-to-Basics – Information Security
The second part to my Back-to-Basics primer on Information Security has been published on CyberAwake today: Information Security in the Office (pt.2) Part 1 is here.
Information Security in the Office (pt.1)
With the summer nearly over, I thought I would kick-off the new season of cyber security articles with a look at some of the simple ways you can improve the cyber and information security in your office and help to prevent information leaking out of your organisation. Some of the …
Continue reading “Information Security in the Office (pt.1)”