I have written a number of articles over the past few weeks about how organisations need to be thinking about theirs’s and their employee’s devices and cyber security. Device Security (Pt. 1) Device Security (Pt. 2) Device Security Just One More Thing… When hardware reaches EOL – Device Security These …
Why the “Principle of Least Privilege” works and something for free…
The Principle of Least Privilege (PoLP) is a fundamental concept in cybersecurity. It ensures that users are granted only the minimum necessary access rights required to perform their job functions. This principle is one I always enforce in cyber security as it is a powerful way of defending the most …
Continue reading “Why the “Principle of Least Privilege” works and something for free…”
Device Security (Pt. 3) Just One More Thing…
This article was previously published on CyberAwake but as it discusses some fundamental ideas about mobile device security and app stores, I thought it should be published here as well. Following on from my two latest articles looking about device security (linked below), I am coming back to the subject, …
Continue reading “Device Security (Pt. 3) Just One More Thing…”
Device Security (Pt. 2)
This is the second part to my article on device security, the first part is here: Device Security (Pt. 1) – CyberAwake Back to Basics – Device Security I finished the first part of this article taking a brief look at hybrid home workers, but of course hybrid working does …
Secure those Online Services
We were early adopters when Microsoft launched Office 365, the online services that would become Microsoft 365. Up to then we had been purchasing Microsoft Office licenses each time a new version of Office was released, which was a substantial cost to a small IT company, but we needed to …