O'Reilly logo

Once More Unto the Breach: Managing information security in an uncertain world by Andrea C Simmons

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

 

CHAPTER 4: NOVEMBER - HOW REMOTE IS REMOTE?

Introduction

There are times in your career as an ISM when you really have to put your hand up and say, ‘hold on a moment’, and ask yourself where sanity and sense have gone!

We can all too easily make things far too complicated. The answers we are seeking are often so simple that they are not what we first consider; nor are they easy to believe because of their simplicity.

Location, location, location

If you set yourself up with a particular network segmentation approach, it may label a significant amount of users as ‘remote’, and this will mean needing to apply two-factor authentication to them all as part of best-practice security management controls. Managing every user outside your core location ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required