Back to Vendor Listings

Sometimes Your Employees Go Home; The Case for Securing Home Users

Bring your own devices (BYOD), USB flash drives, signing into compromised personal web-based accounts from work, and shared passwords. These are some of the reasons for information security professionals to train their employee user base, even when it’s about apparent non-work related computing resources. Becoming visible to your non-security enterprise end users as a security resource…