If you need to ask that question, then the answer is yes! When a user is working on their computer they have certain rights and permissions to access files and run programs. Ideally those rights and permissions should conform to a model of Least Privilege Access. Least Privilege Access is a concept where users working on the network are able to do their job and…
Security Through Maturity
How's your posture?
Moving to a more mature security posture?
Intended to be topical and informative, my blog contains lightweight discussions around various Cyber Security issues.
-
Had a great time @Sophos Discover Lisbon last week. Some amazing new technologies on the horizon, can't wait to get stuck in! Thank you! May 20th, 2017
-
What can we learn from the BA outage?Jun 15th, 2017
-
Is your Incident Management like Dad’s Army?Jun 7th, 2017
-
Thoughts on HSBC voice recognition…Jun 1st, 2017
-
Is Password Management software secure?May 25th, 2017
-
Is my business vulnerable to WannaCry?May 19th, 2017
Application Whitelisting
AppLocker
Board
BYOD
Cloud
Compliance
Confidentiality
Cyber Attack
Data Breach
Data Protection
Encryption
Firewall
GDPR
Home and Mobile Working
Hotspot
Incident Response
Information Risk Management
IoT
Log Management
Malvertising
MDM
Mobile Device Management
Mobile Working
Monitoring
Password Management
Passwords
Phishing
Privacy
Ransomware
Remote Access
Risk Assessment
Risk Management
Road Warrior
SIEM
Smartphone
Social Engineering
SRP
Training
Travelling
Updates
User Privileges
VPN
Vulnerability
Vulnerability Scans
Wi-Fi