It is so easy for an organisation to just let their staff use their own devices – it can save a lot of expense – but no organisation should let BYOD “just” happen. This series will help you understand what BYOD has to be a choice benefiting both the organisation …
The most basic of information privacy mistakes
When sending a group email out, but you do not want the group to know who the individuals are – use the bcc option. We all know this, and we all know of instances where it has not been used and the identities of all the other recipients have been …
Continue reading “The most basic of information privacy mistakes”
I love it when a plan comes together…
My recently completed Back to Basics BYOD Primer has been neatly incorporated into my soon the be completed Insider Threat Primer: Insider Threat and BYOD (pt.6) – CyberAwake If you need to get up to speed with either topic then these Primers will answer many of the starting questions to …
Your BYOD Policy – Keeping the Paperwork Straight (pt.6)
So, you have decided that Bring Your Own Device (BYOD) is something that you can work with – rather than something that is just happening around you. You have sat down and thought about what could be done on your employees’ devices to improve the operations, to make life easier …
Continue reading “Your BYOD Policy – Keeping the Paperwork Straight (pt.6)”
Apple Patches
Apple has issued two patches for vulnerabilities that are currently being exploited by threat actors: Apple Fixes Two Exploited Vulnerabilities – SANS Internet Storm Center As always check these have been done especially for any device that used for “BYOD” with your information. Othe news on Apple updates Recently Apple …