This is the second part to my article on device security, the first part is here: Device Security (Pt. 1) – CyberAwake Back to Basics – Device Security I finished the first part of this article taking a brief look at hybrid home workers, but of course hybrid working does …
Secure those Online Services
We were early adopters when Microsoft launched Office 365, the online services that would become Microsoft 365. Up to then we had been purchasing Microsoft Office licenses each time a new version of Office was released, which was a substantial cost to a small IT company, but we needed to …
Back to Basics – The Collection.
This week the Wednesday Bit is about is highlighting some of the mini-series and back to basics cyber security primers I have written. Why? Because yesterday when I was speaking with a long-term client about password hygiene in their organisation, they were unaware I had a Password Primer they could …
Anonymous?
I came across this article by Matt Burgess over on Wired UK, about being anonymous online, whilst I was doing some research for a client last week (yes, whilst on leave). I thought you should all read it as privacy is important: How to Be More Anonymous Online | WIRED …
More about your VPN
This is a follow-on article to last week’s article Let’s Talk About Your VPN. You should read that article first, to save me having to explain what a VPN is and why I am talking about them now. VPN Issues I spent last week talking up the cyber security advantages …