Practical IT: handling perimeter expansion and disintegration
All it takes is a single successful drive-by-download or malicious email and an attacker has full control over a computer in your company. Your network firewall, focused on blocking attacks from the outside world, won’t offer much help.
It’s time to take a strategic approach to combatting the risks, explains Ross McKerchar.
Read more: Practical IT: handling perimeter expansion and disintegration
Story added 13. July 2012, content source with full text you can find at link above.