CHAPTER 4: NOVEMBER: HOW REMOTE IS REMOTE?
Introduction
There are times in your career as an ISM when you really have to hold your hand up and say, ‘hold on a moment’, and ask yourself where sanity and sense have gone!
We can all too easily make things far too complicated. The answers we are seeking are often so simple that they are not what we first consider; nor are they easy to believe because of their simplicity.
Location, location, location
If you set yourself up with a particular network segmentation approach, it may label a significant amount of users as ‘remote’ and this will mean needing to apply two-factor authentication to them all, as part of best-practice security management controls. Managing every user outside your core location ...
Get Once More unto the Breach now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.