article thumbnail

InfoSec Policies and Standards: Some strategic context for those just diving into this world

CTOvision

Time, money, and resource mobilization are some factors that are discussed in this level. Once the information security policy is written to cover the rules, all employees should adhere to it while sending email, accessing VOIP, browsing the Internet, and accessing confidential data in a system. Firewall Policy.

Policies 268
article thumbnail

Fountainhead: The End of the Laptop-Centric World?

Fountainhead

Whenever Margo does remote work with a given client -- accessing the intranet, using internal apps, interacting via collaboration software, or even certain VoiP apps -- she must use the appropriate laptop. Enter the concepts of "Mobile applications" and "Virtual desktops". Labels: Mobile Work , Mobility , Predictions , VDI.

article thumbnail

Building Blocks of a Secure Tech Infrastructure: A Chief Product Officer’s Guide

Kitaboo

Network – This includes network elements like LAN and WAN along with internet connection, VoIP, switches, routers, and more. Discover How An Ebook Conversion, Publishing & Distribution Platform Can Help You Kitaboo is a cloud-based content platform to create-publish & securely distribute interactive mobile-ready ebooks.