Summary
Today’s businesses rely on traveling employees to “get things done.” When organizations ask their employees to work from remote locations, they must empower their employees with access to data. Remote employees with access to sensitive data are an appealing target to the next-generation hacker. Remote workers leave the safety of the corporate firewall and the sharp eyes of the attack monitoring of your corporate network. The networks your employees join are hostile, initiating attacks against the isolated information systems, probing for opportunities to pilfer sensitive data. Even when adequate technical protection mechanisms are in place on the mobile device, do your employees understand the security warnings presented to them? Can they make the correct decisions when it comes to these warning signs? Do the applications you’ve developed internally have robust protection mechanisms for hostile environments? If you’re not sure whether your employees know how to react when faced with an onslaught of direct attacks against their systems, should they really be protecting that data?
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access