My recently completed Back to Basics BYOD Primer has been neatly incorporated into my soon the be completed Insider Threat Primer: Insider Threat and BYOD (pt.6) – CyberAwake If you need to get up to speed with either topic then these Primers will answer many of the starting questions to …
Your BYOD Policy – Keeping the Paperwork Straight (pt.6)
So, you have decided that Bring Your Own Device (BYOD) is something that you can work with – rather than something that is just happening around you. You have sat down and thought about what could be done on your employees’ devices to improve the operations, to make life easier …
Continue reading “Your BYOD Policy – Keeping the Paperwork Straight (pt.6)”
Apple Patches
Apple has issued two patches for vulnerabilities that are currently being exploited by threat actors: Apple Fixes Two Exploited Vulnerabilities – SANS Internet Storm Center As always check these have been done especially for any device that used for “BYOD” with your information. Othe news on Apple updates Recently Apple …
The end of the password as we know it…
…pssst. I have a secret. What’s the password? Passwords have been around forever. In the Bible the password was “shibboleth”, the Romans had “watchwords”, “tessera” is Latin for password and who could forget “Open Sesame”. In our connected, digital world we all depend on them and have depended on them …
Password Rules
Not for you but for developers and programmers. I they do not set effective password parameters then it can be too easy for a user to take a shortcut to a poor password and poor cyber security. NIST Recommends Some Common-Sense Password Rules – Schneier on Security Your Takeaway If …