NAC security guide
This mini learning guide is a part of SearchSecurity.com’s multi-page series, NAC security guide: How to achieve secure network access in the enterprise
Requires Free Membership to View
Remote employees can open an organization’s network up to a plethora of different threats and problems, and managing remote workers and ensuring they are working from a secure home network is never an easy task.
This SearchSecurity.com mini learning guide is a compilation of tips from our experts on how to secure remote network access. The guide offers best practices for managing remote employees and helping them set up a secure home network, as well as what to include in a remote access audit.
Managing
remote employees: Musts for setting up a secure home network
Ensuring that employees who work from home are setting
up a secure home network is one of the most difficult aspects of managing
remote access security.
In this expert response, get advice from enterprise threat expert Nick Lewis on managing remote employees, and how to set up a secure home network, including how to secure computers in use at employee’s homes and how to secure the connection between those computers and the enterprise network.
Tips on managing remote employees
Get tips on managing spyware protection for remote employees.
Learn how to craft a data backup and disaster recovery plan for remote employees in this podcast.
What
to include in a remote access audit
Is your organization conducting a remote access
audit? In this expert response, security pro Randall Gamby makes recommendations and explain what
areas organizations should be sure to assess during a remote access audit, including remote access
devices and Internet scanning and penetration testing.
Securing
the intranet with remote access VPN security
There are a variety of different configurations options to consider when dealing with
remote access to the corporate intranet. How can an organization ensure security, and what
configuration will work best for your organization?
In this expert response, get the answers to those questions and learn about building a secure intranet with a remote access VPN, as well as which options are available for remote access without a VPN.
This was first published in March 2012
Security Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation