BYOD (Bring Your
Own Device) is the allowance of employee-owned equipment onto company
systems. Typically, this involves employees using consumer computing
devices (such as iPads or Surface tablets) to get work done, either in the
office, at home, or on the road. Many of these devices are not designed to “get work done,” but instead to consume content (e.g., checking email, reading news, social media, etc.). These devices are not managed and may lack even the most basic security features enabled. Here is the problem: If your BYOD strategy is not planned correctly, this can spell disaster for any corporate network. How is your company protecting its data on
devices out of its control? What happens when an employee leaves the company or a device is accidentally left behind at a coffee shop?
There is no shortage to the number of methods one can use to remotely access another computer. Now I’m not talking about any kind of Spyware, but rather remote control software or services which are perfectly safe, legal, and on the up and up. Continue reading
In Parts 1 and 2 I discussed securing your network perimeter and server environment. But as I said in the beginning, IT security is like an onion. Let’s take a look at the 3rd layer of that onion… securing your end-user environment. Again, this is not meant to be a complete list, but instead a starting point to help you think through your own IT security strategy. Continue reading
Permanent link to this article: https://www.robertborges.us/2012/04/it-security/it-security-is-like-an-onion-it-security-basics-part-3-end-user-security/