Skip to content
Christmas cyber security advice Cyber Awake
  • Home
  • Training
  • Schools
  • Knowledge Base
  • You
    • Login
    • My account
    • Groups Dashboard
    • All Courses
  • Contact
  • Home
  • Training
  • Schools
  • Knowledge Base
  • You
    • Login
    • My account
    • Groups Dashboard
    • All Courses
  • Contact
£0.00 0 Basket
CyberAwake
  • Home
  • Training
  • Schools
  • Knowledge Base
  • You
    • Login
    • My account
    • Groups Dashboard
    • All Courses
  • Contact

policies and procedures

Christmas

Christmas cyber security advice

Working from Anywhere and Business Email Compromise If you are looking for something lighter because it is Christmas, can I … Read more

Categories Cyber Security Tags business email compromise, CEO, Christmas, hybrid working, Octagon Technology, policies and procedures, Smart Thinking Solutions
hybrid working

Cyber Security and Hybrid Working

Although there are Big Tech CEOs (Rushe, 2022) and Conservative ex-ministers (Ambrose, 2022) who do not like their subordinates working … Read more

Categories Cyber Security Tags cyber security, cybersecurity, hybrid working, policies and procedures, working from anywhere
reputation

How much are you relying on your web designer to protect your reputation?

In my last article we looked at why you need policies in place to check what apps your team members … Read more

Categories Governance Tags cloud outsourcing, Due Diligence, governance, malware, Plugins, policies and procedures, reputation, software, website security, WordPress, zero-day
patches and updates

Just Check

Cyber Security Due Diligence I use and recommend to clients Microsoft 365 and Google Workspace and I do not run … Read more

Categories Cyber Security Tags Due Diligence, malware, policies and procedures, smartphones, software, website security, zero-day
insider threat

Back again, because that insider threat has not gone away…

On Tuesday I started this short Insider Threat series with quickly setting the threat landscape and realising that protecting yourself … Read more

Categories Cyber Security Tags AAA, academic paper, accountability, authentication, authorisation, data leak, data theft, Information Management, information segregation, insider threat, policies and procedures, role based access control
VPN out of the office

More about VPNs

An important aspect of our cyber security awareness training and project implementation is getting people to understand that good governance, … Read more

Categories Cyber Security Tags coffee shops, holidays, iOS, iOS VPN, policies and procedures, Smart Thinking Solutions, travel, Virtual Private Network, VPN, working from anywhere
Bring your own device

Are you using Bring Your Own Device – BYOD – to save money?

If you are, that is perfectly acceptable. One of the benefits to business of Bring Your Own Device (BYOD) is … Read more

Categories Devices Tags AAA, Bring Your Own Device, BYOD, Pinciple of Least Privilege, policies and procedures
usb no

If you must use portable USB drives, then you must read this…

We discourage the use of USB drives both internally and by clients – the issues arising include: Japanese man loses … Read more

Categories Cyber Security Tags BBC, Bleeping Computers, data breach, data leak, data theft, encryption, insider threat, policies and procedures, SanDisk, training, trust, USB portable storage, Western Digital
coffee and work from anywhere

You Still Need Great Cyber Security Even When You Are Working Anywhere

Following my blog on Tuesday about VPNs and security when “working anywhere”, including on holiday, here is a revised version … Read more

Categories Cyber Security Tags AAA, accountability, authentication, authorisation, COVID-19, cyber security, cybersecurity, London, Microsoft 365, policies and procedures, routers, Virtual Private Network, VPN, working from anywhere
VPN out of the office

Do you have a “work from anywhere” policy? We’ll start with a VPN.

“Working from anywhere” can mean working somewhere really nice – the photo is from a lake side cabin at Pine … Read more

Categories Cyber Security Tags AAA, policies and procedures, travel, Virtual Private Network, VPN, working from anywhere
Older posts
Newer posts
← Previous Page1 … Page3 Page4 Page5 Next →
Do you have a “work from anywhere” policy? We'll start with a VPN. Cyber Awake

Contact us for consultation

Wake up to cyber threats..

Profile Cyber Awake
HQ Based between Newark and Lincoln

Get in touch

CyberAwake
Unit 2 Kingsley Court
Kingsley Road
Lincoln
LN6 3TA
United Kingdom

01522 508089

useful links

  • Knowledge Base
  • Training
  • About Us
  • Partner with Us
  • Contact
  • Cyber Security News
  • Terms of Service / Cookies / Privacy

© 2022 CyberAwake

Website Cookies Icon

This website uses cookies to ensure you get the best experience on our website. Click for more information.

accept & Close