At 12:27 2017-05-30, Stephen Russell srussell705@gmail.com wrote:
[snip]
Each environment has it's own line issues, but no users who are well versed in "the internet vs the network" would ever ask for limited functionality, instead, they would demand the web as it provides access to everything.
Do those well-versed users you mention know about security issues?
Considering all of the on-line break-ins, it is worth thinking about *who* is being provided access to everything.
Sincerely,
Gene Wirchenko
On Wed, May 31, 2017 at 2:35 PM, Gene Wirchenko genew@telus.net wrote:
At 12:27 2017-05-30, Stephen Russell srussell705@gmail.com wrote:
[snip]
Each environment has it's own line issues, but no users who are well versed
in "the internet vs the network" would ever ask for limited functionality, instead, they would demand the web as it provides access to everything.
Do those well-versed users you mention know about security issues? Considering all of the on-line break-ins, it is worth thinking about*who* is being provided access to everything.
Those users have titles like IT Operations manager, CIO, IS Director. Yes, I believe they know about security.
Access is all about a log-in process. Is your connection to data passed through a decryption algorithm first or do connect because it is easier that way?