Comment Re:Hardly. (Score 1) 348
Ah, conceit. Tell me, if CEO Joe Blow has access to your confidential docs, and he brings in an infected computer, or sets his laptop up as a WiFi AP, how are you going to prevent a virus or malicious user from having unwanted access? In the virus case, the virus has his credentials and MAC address, and in the laptop-AP scenario, the attacker has his MAC address.
And Im aware that it is possible to mitigate the second scenario if you have a substantial budget and IT resources, but good luck mitigating the first.
1. Windows Rights Management -- Prevent confidential data from leaving. Or prevent the computer from getting a virus by using OS X or Linux. The number of ways to prevent legitimate systems from compromising your systems is astounding. Infosec 101 -- Users are your worst enemies.
2. If you allow your users administrative access on a machine where they can bridge their connections then your already screwed.
I guess what I am trying to say is all of these challenges have been known to infosec forever. Now its just creating a strong department that follows good security guidelines.