Who's in control: a six-step strategy for secure IT

@article{Facey2011WhosIC,
  title={Who's in control: a six-step strategy for secure IT},
  author={Stuart Facey},
  journal={Netw. Secur.},
  year={2011},
  volume={2011},
  pages={18-20}
}
  • Stuart Facey
  • Published 2011
  • Computer Science, Business
  • Netw. Secur.
As more and more organisations encourage flexible and remote working policies that allow employees to work outside the office, the complexity surrounding remote access and support mechanisms for the IT helpdesk has also increased. There is a growing and unregulated market for solutions that can ‘fix’ IT issues quickly and efficiently no matter where workers are located: however, as with many solutions, remote support and access products have their own inherent security risks that should not be… Expand