[prev in list] [next in list] [prev in thread] [next in thread] 

List:       security-basics
Subject:    Re: Mobile wireless users
From:       ttate () ctscorp ! com
Date:       2005-05-31 7:54:06
Message-ID: CBB60F294B37 () listserve ! ctscorp ! com
[Download RAW message or body]

So, is there any concern about the company enabling a risky situation to occur with the user and any private transactions they might make using a company-provided laptop?

>>> "Gross Barry D." <bd.gross@hosp.wisc.edu> 05/27/05 10:52AM >>>
If you allow them to access these resources over unencrypted means they
will. whether it be from their company owned laptop at star bucks,
their own personal laptop at star bucks, an internet kiosk at times
square...etc.

maybe you need to look at your publicly available/unencrypted resources
to determine if they can be encrypted.

we do have policy prohibiting access (encrypted or not) to our resources
from public internet terminals. Our experience has been If you can't
enforce it technically you can't enforce it.




-----Original Message-----
From: ttate@ctscorp.com [<mailto:ttate@ctscorp.com]> 
Sent: Wednesday, May 25, 2005 10:29 PM
To: security-basics@securityfocus.com
Subject: Mobile wireless users


<snip>
What about the times they use organization resources that are exposed to
the general public and enter private credentials to gain access to those
resources? How do you help your wireless users be paranoid about what
they are accessing when using wireless access? How do you prepare them
to handle various activities that they may want or need to perform using
those wireless devices?
<snip>
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic