Skip to content
If you need some help with cyber security - look no further... Cyber Awake
  • Home
  • Training
  • Schools
  • Knowledge Base
  • You
    • Login
    • My account
    • Groups Dashboard
    • All Courses
  • Contact
  • Home
  • Training
  • Schools
  • Knowledge Base
  • You
    • Login
    • My account
    • Groups Dashboard
    • All Courses
  • Contact
£0.00 0 Basket
CyberAwake
  • Home
  • Training
  • Schools
  • Knowledge Base
  • You
    • Login
    • My account
    • Groups Dashboard
    • All Courses
  • Contact

governance

calm - cyber security culture

If you need some help with cyber security – look no further…

I am in a busy period helping several organisations with IT and Cyber Security Audits among other jobs. Because of … Read more

Categories Governance Tags cyber security, governance, policies and procedures, Smart Thinking Solutions, training
coffee makes for good planning and preparation

Practice Drinking Coffee* better known as Planning and Preparation

Sorry, this is not a coffee* appreciation article it is an article about planning and preparation for an incident. Planning … Read more

Categories Governance Tags back-ups, coffee, credentials, cyber security, Cyber-Attack, cybersecurity, email threat, governance, Longer Reads, malware, new articles, phishing, planning and preparation, ransomware, Smart Thinking Solutions, social engineering, training
privacy

Social Media and Privacy

There has been a lot of talk over the past couple of weeks about the privacy of and the banning … Read more

Categories Privacy Tags cyber security, encryption, Google, governance, HBO, John Oliver, LinkedIn, Meta, Microsoft, Microsoft 365, OneDrive, policies and procedures, Privacy, Secrecy, Smart Thinking Solutions, social media, TikTok, YouTube
start now on your insider threat project

Insider threat – A conclusion… (pt.7)

Today I am going to bring this Back to Basics Primer about the insider threat and what smaller organisations can … Read more

Categories Cyber Security Tags AAA, accountability, authentication, authorisation, blame, data leak, data theft, governance, information catagorisation, information segregation, insider threat, patches, Principle Of Least Privilege, role based access control, Smart Thinking Solutions, updates
BYOD

Insider Threat and BYOD (pt.6)

It has been a couple of weeks – I have been working on a couple of IT and Cyber Security … Read more

Categories Cyber Security Tags AAA, accountability, authentication, authorisation, blame, Bring Your Own Device, BYOD, data leak, data theft, governance, information catagorisation, information segregation, insider threat, patches, Principle Of Least Privilege, role based access control, Smart Thinking Solutions, updates
the insider threat can be just careless

The Insider Threat – Careless (pt.5)

Up to now, we have been discussing the insider threat in relation to a trusted insider committing a breach of … Read more

Categories Cyber Security Tags AAA, accountability, authentication, authorisation, blame, data leak, data theft, governance, information catagorisation, information segregation, insider threat, patches, Principle Of Least Privilege, role based access control, Smart Thinking Solutions, updates
anyone could be an insider threat - either malicious or accidental

The Insider Threat – An Investment. (pt.4)

Before we start this next article in my Insider Threat Primer, I need to address a question that a client … Read more

Categories Cyber Security Tags AAA, accountability, authentication, authorisation, blame, data leak, data theft, governance, information catagorisation, information segregation, insider threat, Principle Of Least Privilege, role based access control, Smart Thinking Solutions
Anyone could be an insider threat

The Insider Threat – Mitigation. (pt.3)

This is the third part of my series on the Insider Threat. We have touched on trust and have discussed … Read more

Categories Cyber Security Tags AAA, accountability, authentication, authorisation, data leak, data theft, governance, information catagorisation, information segregation, insider threat, Principle Of Least Privilege, role based access control, Smart Thinking Solutions
Is this an issue when it comes to the insider threat

The Insider threat – Start thinking about sorting. (pt.2)

We will start this next part of my Insider Threat back-to-basic primer, right where we finished last week’s instalment. I’m … Read more

Categories Governance Tags AAA, accountability, authentication, authorisation, data leak, data theft, governance, information catagorisation, information segregation, insider threat, Principle Of Least Privilege, role based access control, Smart Thinking Solutions
information security

Information Security in the Office (pt.4)

This is part 4 of a short series looking at information security in the office – here are links to … Read more

Categories Cyber Security Tags Bill Toulas, end-of-life, EOL, governance, hybrid working, information security, infrastructure, patches, updates, work from anywhere
Older posts
Page1 Page2 … Page5 Next →
Information Security in the Office (pt.4) Cyber Awake

Contact us for consultation

Wake up to cyber threats..

Information Security in the Office (pt.4) Cyber Awake
HQ Based between Newark and Lincoln

Get in touch

CyberAwake
Unit 2 Kingsley Court
Kingsley Road
Lincoln
LN6 3TA
United Kingdom

01522 508089

useful links

  • Knowledge Base
  • Training
  • About Us
  • Partner with Us
  • Contact
  • Cyber Security News
  • Terms of Service / Cookies / Privacy

© 2022 CyberAwake

Website Cookies Icon

This website uses cookies to ensure you get the best experience on our website. Click for more information.

accept & Close