Tag Archive: VPN

Bring Your Own Device: Making BYOD Work in Your Company

Back in 2012, I wrote a post Bring Your Own Device (BYOD): Is BYOD Bad for Your Company? based on the commonly available technology at the time.  Now that nearly 6 years have passed, I’d say it is time for an update. 

BYOD (Bring Your Own Device) is the allowance of employee-owned equipment onto company systems.  Typically, this involves employees using consumer computing devices (such as iPads or Surface tablets) to get work done, either in the office, at home, or on the road. Many of these devices are not designed to “get work done,” but instead to consume content (e.g., checking email, reading news, social media, etc.). These devices are not managed and may lack even the most basic security features enabled. Here is the problem: If your BYOD strategy is not planned correctly, this can spell disaster for any corporate network.  How is your company protecting its data on devices out of its control?  What happens when an employee leaves the company or a device is accidentally left behind at a coffee shop?

Read the rest of this entry »

Permanent link to this article: https://www.robertborges.us/2019/01/it-security/bring-your-own-device-making-byod-work-in-your-company/

How to remotely access you home or office PC

There is no shortage to the number of methods one can use to remotely access another computer.  Now I’m not talking about any kind of Spyware, but rather remote control software or services which are perfectly safe, legal, and on the up and up. Read the rest of this entry »

Permanent link to this article: https://www.robertborges.us/2012/05/mobile-computing/how-to-remotely-access-you-home-or-office-pc-2/

IT Security is Like an Onion – IT Security Basics – Part 3: End-User Security

In Parts 1 and 2 I discussed securing your network perimeter and server environment. But as I said in the beginning, IT security is like an onion. Let’s take a look at the 3rd layer of that onion… securing your end-user environment. Again, this is not meant to be a complete list, but instead a starting point to help you think through your own IT security strategy. Read the rest of this entry »

Permanent link to this article: https://www.robertborges.us/2012/04/it-security/it-security-is-like-an-onion-it-security-basics-part-3-end-user-security/