I have an article published on CyberAwake today looking at social media and app privacy. Social Media and Privacy – CyberAwake Remember that good privacy can lead to good cyber security. If you keep something a secret then it makes it that much harder for a threat actor to attack. …
Why you need to protect your organisation’s M365 credentials
We have had to deal with several incidents of Business Email Compromise (BEC), where for one reason or another someone has had their Microsoft credentials compromised and a threat actor has got inside their email. It is a serious problem because threat actors make a lot of money from it. …
Continue reading “Why you need to protect your organisation’s M365 credentials”
I love it when a plan comes together…
My recently completed Back to Basics BYOD Primer has been neatly incorporated into my soon the be completed Insider Threat Primer: Insider Threat and BYOD (pt.6) – CyberAwake If you need to get up to speed with either topic then these Primers will answer many of the starting questions to …
Your BYOD Policy – Keeping the Paperwork Straight (pt.6)
So, you have decided that Bring Your Own Device (BYOD) is something that you can work with – rather than something that is just happening around you. You have sat down and thought about what could be done on your employees’ devices to improve the operations, to make life easier …
Continue reading “Your BYOD Policy – Keeping the Paperwork Straight (pt.6)”
Apple Patches
Apple has issued two patches for vulnerabilities that are currently being exploited by threat actors: Apple Fixes Two Exploited Vulnerabilities – SANS Internet Storm Center As always check these have been done especially for any device that used for “BYOD” with your information. Othe news on Apple updates Recently Apple …