IS 3230
Remote Access Method Evaluation
Many companies inform their IT’s as to who will receive access to the network and what type of equipment they will be using. It could be from an older vpn that needs a software package to run on a trustworthy network, which would be safe to run from a home PC or smartphone. No network is ever 100% secure. Companies should access their needs and risks, and then write their acceptable use policies. Some companies may find it easier to rent a secure cloud app rather than installing in-house software, but this may not meet all of the company’s needs.
Companies using remote access