iOS 10 Parental Control Settings

  I have discussed here and here many of the dangers that kids face when trying to navigate technology and the Internet and some ideas for parents on how to mitigate these risks.  Parents have several choices available to them for parental controls on iOS devices and for this post, I tried several of the

Cybersecurity Considerations with Bring Your Own Device (BYOD) Implementations

  Bring Your Own Device (BYOD) refers to allowing end users the ability to use their own personal mobile devices (e.g., phones, tablets, laptops, etc.) to conduct business instead of having a corporate device issued to them.  BYOD is often seen as a cost savings and a step toward a “21st Century Workforce” by executives. 

Making a Risk-Based IT Change Management Process

  A key component to any successful and mature Information Technology (IT) team is a disciplined change control process.  Few things are more frustrating to an IT manager than having a service affecting outage and not being able to immediately identify recent changes to the environment. Change control requires rigor, discipline, auditing, and a commitment from

Reducing Classified Spillage Incidents

  A classified spillage (commonly referred to as a spill) incident occurs when information is transmitted, processed, or stored on an information system that is not accredited to contain that level of information.  Usually, this occurs when a classified document (confidential, secret, top secret, etc.) is created, stored, or emailed on unclassified systems or networks. The