Get a Pentest and security assessment of your IT network.

News

Tips for the Endpoint Warrior

Security policies should be spelled out clearly which devices and activities are allowed. Block sites and activities that dont have anything to do with work should be blocked. Use smart network access control solutions to enforce your security policies. Encrypt laptops in your organization, even if you don’t use laptops, you may be using them during a disaster. Use monitoring devices that will stop users from plugging in external drives, USBs into PCs and copying of files onto CDs or other media.”]

Source: https://www.cuinfosecurity.com/tips-for-endpoint-warrior-a-615

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

SEA has stolen invoices that shows Microsoft charges FBI for user data

News

Greek police arrested a man running the BTC-e Bitcoin exchange to launder more than US$4bn worth of the Bitcoin