The Missing Report – Phone Security: 20 Ways to Secure Your Mobile Phone 3.1 3.1.18 3.1.19 Access Control
This article provides companies with ideas on how to mitigate the risk that mobiles carry with them as attackers turn to target them.
This article provides companies with ideas on how to mitigate the risk that mobiles carry with them as attackers turn to target them.
This post provides information as well as a downloadable worksheet that organizations can use to plan and demonstrate separation of duties.
This example policy from UCSF describes their organized approach in deploying wireless technologies on the enterprise network.
The policy provides a background of who is granted privileged access. On page 2, the policy indicates that “If access is required when off-campus, then the user must use the university’s VPN and university approved multi-factor authentication. Wherever and whenever possible Privileged Access users must utilize university approved multi-factor authentication.”
This sample policy from Michigan is an example of how an organization can provision and deprovision access to systems and applications.
This paper focuses on the risks associated with simple media devices and smart media devices.
This article describes how to configure a session termination condition in Windows.
This video shows administrators how to configure a logon banner using Group Policies in Active Directory.
This video focuses on implementing an Interactive Message Before Login feature.
This video shows administrators how to configure a logon banner in Cisco IOS for routers and switches