Practical IT: handling perimeter expansion and disintegration

All it takes is a single successful drive-by-download or malicious email and an attacker has full control over a computer in your company. Your network firewall, focused on blocking attacks from the outside world, won’t offer much help.

It’s time to take a strategic approach to combatting the risks, explains Ross McKerchar.

Read more: Practical IT: handling perimeter expansion and disintegration

Story added 13. July 2012, content source with full text you can find at link above.