What We’re Reading, Week of 12/14

Posted: December 17, 2009 in Highlights

eWeek Security Watch…
Survey Lists Top Enterprise Endpoint Security and Compliance Holes
This post by Brian Prince discusses a survey of about 100,000 endpoints from some 25 organizations, revealing that all of them had between 10 and 30 percent security- or policy-compliance issues. The survey found the key issues are missing third-party agents, unauthorized peer-to-peer applications, missing Microsoft updates and out-of-date or misconfigured antivirus.

The Ashimmy Blog…
The Evolution of NAC
While reading Alan Shimel’s post, An Incite-ful Tuesday: Playing catch up, we came across another post of his, The evolution of NAC, where he discusses Jeff Wilson of Infonetics Research’s strong support for NAC. He says that with companies going out of business and market numbers not growing as projected, a new angle needs to be taken on NAC. This is what Jeff and and team have done with their new whitepaper titled the “The Evolution of Network Access Control”, which is available free to download if you are interested.

Business Week…
Security Evaluation of Remote Users
In this post, Jeff Hughes offers some advice for companies to ensure that they are doing everything possible to secure their network from their own users. Companies should require that all remote users outside the perimeter firewall connect using a virtual private network. All employees should also use an antivirus solution and have their laptops regularly patched and updated and change their passwords frequently. He also recommends companies create a remote-access usage policy and set clear expectations.

Network World…
IT Pros Go Mobile for Holiday Work
According to survey results, fewer IT professionals intend to spend holiday time in the office this season and the number of high-tech workers planning to log hours at work reduced by half since 2006. Over 200 small and midsize businesses were surveyed to learn about IT pros’ holiday work plans. With Eighty-two percent of business managers intending to log in remotely, and 75% of IT staffers also telecommuting, let’s hope they will be using a secure VPN client.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s