08-06-2016, 10:08 AM
11-06-2016, 08:43 PM
The practice isn't new. Some companies are using separate machines for external accesses e.g. customer service, and partnerships. The popularity of personal devices, has made the deployment much easier, and less painful.
Anyway, the most vulnerable, is still the people, rather than the system configuration.
Anyway, the most vulnerable, is still the people, rather than the system configuration.