| Network Security in Sacramento Begins With an Acceptable Use Policy and ends with a great IT company
Does your company have a network access and authentication policy? What is the "password" policy? Do you even need a "password" to use the company network? Can anyone just come in and plug whatever phone, pad or computer device they happen to have into the company network? What is the data storage and retention policy? Do you allow VPN tunnels that extend your company network to a home office or coffee shop? Do you allow your users to connect third party provided equipment to your network? Is it acceptable that Bob just added a hub to his office network connection so he can plug in his own printer? How do we feel if Bob plugs in his own wireless access point? Do we have a "guest" network and do we let those folks know what is acceptable on your network?
firewall, trusted, internal, computer network, the internet, wireless network, coffee shop, distributed enterprise, sacramento, CISCO, certified security professional, security audit, network assessment, acceptable use, policy, network users, personal email, blogging, file sharing, authentication policy, password policy, company network, lease agreement, computer network, home land security, public IP, IP address, user agreement, mitigate, costs, defeding, ebola virus, adware, remote access terminal, corporate data
post-template-default,single,single-post,postid-769,single-format-standard,ajax_updown_fade,page_not_loaded,boxed,,qode-title-hidden,overlapping_content,qode-theme-ver-10.1.1,wpb-js-composer js-comp-ver-5.0.1,vc_responsive