Before I start this week’s Wednesday Bit, let me send you over to read this first – you need to understand the value I put on encryption: Encryption or Not Encryption The real-world case for encryption The other week I got introduced to a new client under difficult circumstances – …
Another improvement in Android security
I have written about the difference between Apple iOS cyber security and Android OS security before. In my opinion, Apple has the edge for a variety of reasons: But Android is catching up… Recently Google has taken a number of steps to improve the cyber security of Android devices: A …
Back to Basics – The Collection IV
As 2024 draws to a close and we all start making plans for the holiday season, I thought it would be a good idea to publish an updated list of all my Back to Basics cyber security primers as this week’s Wednesday Bit. These are easy read short series designed …
The Insider Threat Primer
Having to discuss the insider threat with clients is always difficult – they are always already trusting someone (even if they do not think so) and I am calling that trust into doubt. My reports and discussions always include the statement “monitoring what your team does with your information and …
I love it when a plan comes together…
My recently completed Back to Basics BYOD Primer has been neatly incorporated into my soon the be completed Insider Threat Primer: Insider Threat and BYOD (pt.6) – CyberAwake If you need to get up to speed with either topic then these Primers will answer many of the starting questions to …