|
![](/i/fill.gif) |
> Darren New<dne### [at] san rr com> wrote:
>> Why are you carrying sensitive information around on a laptop anyway?
>
> I can imagine a scenario where a employee of a company uses his laptop
> to connect to some not-so-important computer of the company (over a secure
> connection, of course), and this might open a way for a pro hacker to
> access the company's more important servers if he gets access to the
> laptop and with that the login/password to that computer (which might
> itself not contain anything crucial, but which might make it much easier
> to then hack into the more important systems inside the company).
>
> Far-fetched? Yes. Impossible? No. I'm almost 100% certain incidents not
> unlike this have happened many times in the history of computers.
>
And it is exactly why we were recently told that anyone who accesses
internal or customer systems in "privileged mode" had to use
company-owned and controlled assets to do so, because the company thinks
that it is better than us as preventing keyloggers from installing
themselves on our home PCs.
You know this policy came about because something happened somewhere...
--
/*Francois Labreque*/#local a=x+y;#local b=x+a;#local c=a+b;#macro P(F//
/* flabreque */L)polygon{5,F,F+z,L+z,L,F pigment{rgb 9}}#end union
/* @ */{P(0,a)P(a,b)P(b,c)P(2*a,2*b)P(2*b,b+c)P(b+c,<2,3>)
/* gmail.com */}camera{orthographic location<6,1.25,-6>look_at a }
Post a reply to this message
|
![](/i/fill.gif) |