An Inside Job: Extending Enterprise Protection to Remote Laptops

An Inside Job: Extending Enterprise Protection to Remote Laptops
IT managers face significant threats from remote workers and business travellers — in fact virtually any employee who takes a laptop home at night or on the road. To be clear, it's not the employees themselves who are the problem. What's happening is that remote workers are unintentionally and unknowingly infecting their laptops with spyware, Trojans, worms and other malicious code. Then they turn around and plug those laptops into the enterprise when they're back in the office. IT managers need to understand the severity of the situation, what's driving it and why it's only going to get worse. They can also familiarise themselves with tools that can help get things under control. IT managers face significant threats from remote workers and business travellers — in fact virtually any employee who takes a laptop home at night or on the road. To be clear, it's not the employees themselves who are the problem. What's happening is that remote workers are unintentionally and unknowingly infecting their laptops with spyware, Trojans, worms and other malicious code. Then they turn around and plug those laptops into the enterprise when they're back in the office. IT managers need to understand the severity of the situation, what's driving it and why it's only going to get worse. They can also familiarise themselves with tools that can help get things under control. -->

Published on 03 November 2010

By M86 Security
As a registered user of CBR you can skip the majority of this form. Registration is FREE so register now or log in if you're already a member.

Download whitepaper

I have read and accept the terms and conditions and privacy policy.
We'd like to keep you informed about relevant promotions, products and services, or if you would prefer not to receive these, uncheck this box.
If you would prefer not to hear from carefully selected third party companies uncheck this box
More White Papers

Join our network

744 people like this.
0 people follow this.

Related Intelligence and Suppliers

White Papers

Suppliers

Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.