Special to Law.com
| SPONSOR SPOTLIGHT Save hours of time with ALR on Westlaw |
New York Law Journal
| SPONSOR SPOTLIGHT New Podcast with Monica Bay |
Law Technology News
The Recorder
The Legal Intelligencer
Spiceworks
Free Spiceworks IT Desktop. Designed, tested and used by IT pros with everyday IT features for desktop management, including automatic PC and software inventory and IT asset reporting to simplify your job; network monitoring and troubleshooting to keep things running smoothly; and an IT help desk for your company that's easy to use and the fastest-growing IT community.
U.S. Department of Commerce, National Institute of Standards and Technology
This publication provides recommendations for securing external devices used for telework and remote access. Many organizations limit the types of external devices that can be used for remote access and which resources they can use, such as permitting teleworker-owned laptops to access a limited set of resources and permitting all other external devices to access Web-based email only. This allows organizations to limit the risk they incur from external devices. When a telework device uses remote access, it is essentially a logical extension of the organization's own network. Therefore, if the telework device is not secured properly, it poses additional risk to not only the information that the teleworker accesses but also the organization's other systems and networks.
U.S. Department of Commerce, National Institute of Standards and Tedhchol
This publication explains the basics of storage security, which is the process of allowing only authorized parties to access and use stored information. The primary security controls for restricting access to sensitive information stored on end user devices are encryption and authentication.