///////////////////////////////////////////////////////////////////////
their actions, company security policies and
best security practices such as the use of
strong passwords.
Furthermore, training should be an ongoing
activity rather than a one-time exercise. specifically for this as they encrypt data and
hide the IP address of the user. So even if
the employee is accessing sensitive company
data via an insecure connection, potential
attackers wouldn’t be able to extract any
useful information.
Use of VPNs Identity access management
As employees will often use their personal
devices when connecting to company
networks, it is best to provide them with a
secure means of access. VPNs are designed In the world of cloud and the distributed
workforce, there is no more important
security task then being able to identify users
in a strong way. I cannot emphasise how
www.intelligentcio.com
FEATURE: MOBILE MANAGEMENT
Nicolai Solling, CTO, Help AG
INTELLIGENTCIO
47