Extending the Perimeter: Protecting Employees to Protect the Enterprise

In the early days of computing the cyber-security perimeter and the physical security perimeter were one and the same. Access to data implied access to the actual computer or storage media. From there we graduated to closed networks where computers only talked to each other within a building or private network but quickly modems started to allow access by people outside those controlled spaces. The age of the hacker had begun.

read more

Read more: Extending the Perimeter: Protecting Employees to Protect the Enterprise

Story added 7. November 2016, content source with full text you can find at link above.