O'Reilly logo

Once More unto the Breach by Andrea Simmons

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 4: NOVEMBER: HOW REMOTE IS REMOTE?

Introduction

There are times in your career as an ISM when you really have to hold your hand up and say, ‘hold on a moment’, and ask yourself where sanity and sense have gone!

We can all too easily make things far too complicated. The answers we are seeking are often so simple that they are not what we first consider; nor are they easy to believe because of their simplicity.

Location, location, location

If you set yourself up with a particular network segmentation approach, it may label a significant amount of users as ‘remote’ and this will mean needing to apply two-factor authentication to them all, as part of best-practice security management controls. Managing every user outside your core location ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required