Shades Of Grey

Thanks in large part to the Internet, enterprise threats are constant and they are everywhere-- viruses, Worms, Trojans, spyware, adware, phishing attacks, and on and on and on. And throw in the growing ubiquity of so-called greynet apps that end users can install without the help -- or approval -- of IT, and the threat worsens. So what is an under-resource

Amy DeCarlo

October 28, 2005

1 Min Read
Network Computing logo

Thanks in large part to the Internet, enterprise threats are constant and they are everywhere-- viruses, Worms, Trojans, spyware, adware, phishing attacks, and on and on and on. And throw in the growing ubiquity of so-called greynet apps that end users can install without the help -- or approval -- of IT, and the threat worsens. So what is an under-resourced, overburdened systems administrator to do? Read our excellent feature on setting Internet policies and Web control practices and take heed - that is my advice.Yes, I know everyone and their brother is already exhorting you to set actionable security policies and enforce those but I think this feature is a cut above the rest. Writer J.W. Olsen examines in detail what those policies should cover, and what Web control solutions are available to administrators to protect their environments.

The article is full of information and guidance on how to mitigate threats. And the first step is being armed with the right information to make the decisions your organization needs to, forgive my twisted metaphor, wage war on what truly isn't a level battle field.

Read more about:

2005

About the Author(s)

Amy DeCarlo

Principal Analyst, Security and Data Center Services

SUBSCRIBE TO OUR NEWSLETTER
Stay informed! Sign up to get expert advice and insight delivered direct to your inbox
More Insights