Archive for December, 2009

Rethink Remote Access: Stephen Hope’s Advice

Posted: 30th December 2009 by VPN Haus in Rethink Remote Access

Moving forward with our series on how to rethink remote access, we spoke to IT expert Stephen Hope. Stephen is a Solution Design Architect at  Cable and Wireless UK. He shares some insight with us on whether remote access policy is hard to adapt. Policy is not hard to adapt – getting users to stick [...]

Rethink Remote Access: Mark Butler’s Advice

Posted: 28th December 2009 by VPN Haus in Rethink Remote Access

The next IT expert to offer insight on our how to rethink remote access series is Mark Butler, experienced computer and process security professional. Mark shares his perspective on why adapting remote access policy is hard despite new technologies offering employees greater productivity. Remote access is a touchy subject for most IT. It can be [...]

To continue with our how to rethink remote access policy series, IT expert David Pearlstein shares his opinion on why adapting the policy can be difficult and how everyone in an organization can get on board. David is the Principal at DLP Consulting. I think if you can provide information security training to ALL levels [...]

Rethink Remote Access: Anton Ivanov’s Advice

Posted: 21st December 2009 by VPN Haus in Rethink Remote Access

The next IT expert we spoke with for our how to rethink remote access series is Anton Ivanov, a Principal Technical Consultant. With new handhelds, WiFi everywhere and the explosion of mobile applications, great improvements for employee productivity are being offered.  Yet networking and security pro’s complain about enforcing policy to protect the network while [...]

What We’re Reading, Week of 12/14

Posted: 17th December 2009 by VPN Haus in Highlights

eWeek Security Watch… Survey Lists Top Enterprise Endpoint Security and Compliance Holes This post by Brian Prince discusses a survey of about 100,000 endpoints from some 25 organizations, revealing that all of them had between 10 and 30 percent security- or policy-compliance issues. The survey found the key issues are missing third-party agents, unauthorized peer-to-peer [...]