CHAPTER 4: NOVEMBER - HOW REMOTE IS REMOTE?
There are times in your career as an ISM when you really have to put your hand up and say, ‘hold on a moment’, and ask yourself where sanity and sense have gone!
We can all too easily make things far too complicated. The answers we are seeking are often so simple that they are not what we first consider; nor are they easy to believe because of their simplicity.
Location, location, location
If you set yourself up with a particular network segmentation approach, it may label a significant amount of users as ‘remote’, and this will mean needing to apply two-factor authentication to them all as part of best-practice security management controls. Managing every user outside your core location ...