I am not sure anyone is actually calling it that… We have all seen and or heard of this story that is running in the US and around the world: Trump and intelligence chiefs play down Signal group chat leak – BBC News I am not going to get into …
Bring Your Own Device (BYOD) – A Primer
It is so easy for an organisation to just let their staff use their own devices – it can save a lot of expense – but no organisation should let BYOD “just” happen. This series will help you understand what BYOD has to be a choice benefiting both the organisation …
BYOD – Where do you start? (pt.2)
After a short wait… (Another thing about phishing emails… (pt.12) and Problems with QR Codes here is the second part of my series on BYOD – Bring-Your-Own-Device. Trust and BYOD If you are or are thinking of allowing your team to use their devices to do your work – then …
BYOD Bring-Your-Own-Device – A Primer (pt.1)
This is a short series looking at the basics, the benefits and the risks of Bring-Your-Own-Device or BYOD. Today we are going to look at the most useful benefits. Defining BYOD Let’s start with a definition of what BYOD – Bring-Your-Own-Device is. To qualify, a device must be owned by …
Continue reading “BYOD Bring-Your-Own-Device – A Primer (pt.1)”
Keep control of your information
I have implemented information control for one-person organisations – because even a small organisation will have some need to share information with other people and organisations. It is an essential step in any IT and Cyber Security Audit to examine who, has access to what information and what steps are …