After a short wait… (Another thing about phishing emails… (pt.12) and Problems with QR Codes here is the second part of my series on BYOD – Bring-Your-Own-Device. Trust and BYOD If you are or are thinking of allowing your team to use their devices to do your work – then …
BYOD Bring-Your-Own-Device – A Primer (pt.1)
This is a short series looking at the basics, the benefits and the risks of Bring-Your-Own-Device or BYOD. Today we are going to look at the most useful benefits. Defining BYOD Let’s start with a definition of what BYOD – Bring-Your-Own-Device is. To qualify, a device must be owned by …
Continue reading “BYOD Bring-Your-Own-Device – A Primer (pt.1)”
Keep control of your information
I have implemented information control for one-person organisations – because even a small organisation will have some need to share information with other people and organisations. It is an essential step in any IT and Cyber Security Audit to examine who, has access to what information and what steps are …
In the news this week…
As I finish my Back-to-Basics Phishing Email Primer, with an article titled “Phishing Emails are happening right now!“, the BBC publish this: Warning in Guernsey after phishing scam increase – BBC News I am not making this stuff up; board members and senior managers need to have some form of …
Phishing Emails are happening right now! (pt.11)
I am going to bring my “Back-to-Basics Phishing Emails – A Primer” series to a close today – although if other primer projects are any measure we will return with further updates in the future. Phishing Emails – A Clear and Present Danger Just last week the cyber security press …
Continue reading “Phishing Emails are happening right now! (pt.11)”