As more companies provide remote access to their computing networks, often for telecommuting staff, the potential for security disasters increases rapidly. Some recent suggestions for how to implement telecommuting security:
"Do
Don't
Reference: Berinato, Scott. (2000, November 20). Security hole: Home office. eWeek. p. 18.
Related Information:
Desktop Security
Suggestions
IS Physical Security
Levels of Computer
Security
Network Management
Services
Reducing Vulnerability to
Network Attacks In Small Business
Tighten Internal
Computer Security
Threats to Computer Systems
© Copyright 2000 Raymond S. Kulzick. All rights reserved. 001126.
This publication provides business, financial planning, and/or tax information to our clients. All material is for general information only and should not be acted upon without seeking appropriate professional assistance.