CHAPTER 4: NOVEMBER - HOW REMOTE IS REMOTE?

Introduction

There are times in your career as an ISM when you really have to put your hand up and say, ‘hold on a moment’, and ask yourself where sanity and sense have gone!

We can all too easily make things far too complicated. The answers we are seeking are often so simple that they are not what we first consider; nor are they easy to believe because of their simplicity.

Location, location, location

If you set yourself up with a particular network segmentation approach, it may label a significant amount of users as ‘remote’, and this will mean needing to apply two-factor authentication to them all as part of best-practice security management controls. Managing every user outside your core location ...

Get Once More Unto the Breach: Managing information security in an uncertain world now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.