Telecommuting Security
Do's and Don'ts

As more companies provide remote access to their computing networks, often for telecommuting staff, the potential for security disasters increases rapidly. Some recent suggestions for how to implement telecommuting security:

"Do

Don't

Reference: Berinato, Scott. (2000, November 20). Security hole: Home office. eWeek. p. 18.

Related Information:
        Desktop Security Suggestions
        IS Physical Security
        Levels of Computer Security
        Network Management Services
        Reducing Vulnerability to Network Attacks In Small Business
        Tighten Internal Computer Security
        Threats to Computer Systems

© Copyright 2000 Raymond S. Kulzick. All rights reserved. 001126.

This publication provides business, financial planning, and/or tax information to our clients. All material is for general information only and should not be acted upon without seeking appropriate professional assistance.

Home

Main Page

Contact

Search

Contact rkulzick@kulzick.com with questions or comments about this web site.
Copyright © 2000 Kulzick Associates, PA - Last modified: September 13, 2008