3rd Party Credentials

I recently tested an application to determine its usefulness and fitness for purpose. As with several other applications experimented with over the years, this one included the option to integrate directly with other systems; in this case one of the social media platforms. In the settings, an option was available to add the user name […]

Read more

Wipe Before Selling

Put simply, before you sell or give away mobile phones, tablets, desktop computers, laptops or USB drives or other items with data storage such as cameras with memory cards, the contents should be deleted. The risks do depend on your use of the device prior to its disposal and the new recipient of the device. […]

Read more

Understanding the boundary

Understanding the boundary of your organisation is essential to being vigilant and maintaining a high level of security.  Internet at home or in a single-site business can be straight forward but as businesses grow in size and complexity it is very easy to lose control through not understanding the boundary infrastructure, how it is maintained […]

Read more

Public Wi-Fi Y/N?

In recent years, the number of publicly available Wi-Fi hotspots has increased significantly. We have reached a point in time where public Wi-Fi in coffee shops, restaurants and hotels has moved beyond ‘nice to have’ to ‘expected’ and choices of destination are often being decided by Wi-Fi availability over and above quality of food, drink […]

Read more

The Double Edge Sword

When writing about cyber security and implementing defensive measures, common feedback includes questions about the extent to which advice about how to improve personal safety and security can be used by others to inflict harm and carry out cyber-attacks. Clearly, the articles I am writing and publishing here are intended to provide insight into how […]

Read more