Informed CIO: Remote Control: 9 Steps to Ensuring Access, Safely
Well-secured systems are well-managed systems. But as perimeters melt away, security goes beyond encryption, authentication and monitoring. We also need to ensure privileged users aren’t betraying trust. In this report, we’ll cover ways to track who did what to which system, and when—vital to covering yourself in an audit, sure, but also to improving customer service and the support process for remote workers.