Thread
:
Internet Tablets in the Workplace
View Single Post
sondjata
2007-12-07 , 15:02
Posts: 1,076 | Thanked: 176 times | Joined on Mar 2007
#
7
a large portion of security breeches occur by people in the organization who already have access to "the goods."
The next level are users who are given admin rights who never should have been.
the next level, usually in combination with the previous one are e-mails gotten from Yahoo, google but not internal that contain exploits specifically targetted to Outlook.
break in via N800 ranks pretty far down the list of probable problems. our wireless is locked down pretty tight here now and any iPhone, N8xx, has to give up the MAC Address before it is even allowed on the Network.
Quote & Reply
|
sondjata
View Public Profile
Send a private message to sondjata
Find all posts by sondjata