Get a Pentest and security assessment of your IT network.

News

Tips for the Endpoint Warrior

Security policies should be spelled out clearly which devices and activities are allowed. Block sites and activities that dont have anything to do with work should be blocked. Use smart network access control solutions to enforce your security policies. Encrypt laptops in your organization, even if you don’t use laptops, you may be using them during a disaster. Use monitoring devices that will stop users from plugging in external drives, USBs into PCs and copying of files onto CDs or other media.”]

Source: https://www.cuinfosecurity.com/tips-for-endpoint-warrior-a-615

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

Botnet authors use Evernote account as C&C Server

News

Canadian agency breached as hackers exploit CVE-2017-5638 flaw in Apache Struts 2