Along with defense in depth, you need to put some additional best practices into practice to ensure that network security is achieved in your business.
Specific issues that you need to address include the following:
VPN users are at higher risk of software infection because their environment isn't controlled by a corporate security policy.
Security management functions such as logging, reading, and responding to syslog messages and events need to be deployed.
The bulk of the best practices described throughout the book are summarized in Appendix A, “Deploying Effective Security Management.”
Remote access is a staple of many businesses in today's Internet environment. Increasingly, companies ...