Security Basics mailing list archives
RE: Mobile wireless users
From: "Gross Barry D." <bd.gross () hosp wisc edu>
Date: Fri, 27 May 2005 10:52:37 -0500
If you allow them to access these resources over unencrypted means they will. whether it be from their company owned laptop at star bucks, their own personal laptop at star bucks, an internet kiosk at times square...etc. maybe you need to look at your publicly available/unencrypted resources to determine if they can be encrypted. we do have policy prohibiting access (encrypted or not) to our resources from public internet terminals. Our experience has been If you can't enforce it technically you can't enforce it. -----Original Message----- From: ttate () ctscorp com [mailto:ttate () ctscorp com] Sent: Wednesday, May 25, 2005 10:29 PM To: security-basics () securityfocus com Subject: Mobile wireless users <snip> What about the times they use organization resources that are exposed to the general public and enter private credentials to gain access to those resources? How do you help your wireless users be paranoid about what they are accessing when using wireless access? How do you prepare them to handle various activities that they may want or need to perform using those wireless devices? <snip>
Current thread:
- Mobile wireless users ttate (May 27)
- Re: Mobile wireless users Ashish Popli (May 30)
- <Possible follow-ups>
- RE: Mobile wireless users Gross Barry D. (May 30)
- Re: Mobile wireless users ttate (May 31)
- Re: Mobile wireless users ttate (May 31)