Unified Communications: Click to talk » Windows SecurityNews and information about Unified Communications2013-02-01T20:31:43Zhttp://itknowledgeexchange.techtarget.com/connectivity/feed/atom/Tony Bradleyhttp://www.bradleystrategygroup.comhttp://itknowledgeexchange.techtarget.com/connectivity/is-endpoint-security-replacing-network-security/2008-02-24T04:45:42Z2008-02-24T04:45:42ZThere have been rumors for some time that the network perimeter is dead. More users are relying on laptop computers connected over wireless networks, or via VPN from a hotel or coffee shop. Users have mobile phones that connect to network resources, and various methods of portable data storage- USB flash drives, mobile phones, digital cameras, MP3 players. If anyone can connect from anywhere and data is coming and going, it becomes virtually impossible to say what is ‘inside’ the network perimeter, and what is ‘outside’ the network perimeter. If all of that is true, should network security even be an issue? Why not declare a time of death, focus on endpoint security solutions and forget about the network? Read The Future of Network Security at Computerworld for a deeper look at this issue, as well as why the rumors of the death of network security might be exaggerated.
]]>0Tony Bradleyhttp://www.bradleystrategygroup.comhttp://itknowledgeexchange.techtarget.com/connectivity/the-insider-threat/2007-12-19T22:04:01Z2007-12-19T22:04:01ZI know that it is sort of a “sky is falling”, FUD (Fear, Uncertainty, and Doubt) sort of statement, but the threat from inside your network is significant. While you focus on keeping unauthorized users out, locking down your network perimeter, detecting and blocking incoming malware, etc., your authorized users may be busy at work pushing the boundaries of their access and poking your internal security measures for holes. Then there are those users who are authorized access and unwittingly expose sensitive data, such as placing it unprotected on a USB thumb drive which they subsequently misplace while stopping for a cup of coffee. There are a number of ways- both intentional, and accidental- that your users may pose a bigger threat to your network security than all of the bad, nasty external forces seeking to compromise your systems. Check out How dangerous user behavior puts networks at risk to read the whole article and hopefully pick up some tips you can use to protect your network from the inside as well.