We are just now starting to implement a remote access for some of our
user community.  I do not fully understand the risks to our internal
network.  I am wondering what most companys do in regards to,  do they
let their users connect from their own personal computers, or does the
company usually supply a computer for remote access use.

 

Thanks 




Scanned by Check Point Total Security Gateway.


=================================================
To set vacation, Out-Of-Office, or away messages,
send an email to [EMAIL PROTECTED]
in the BODY of the email add:
set fw-1-mailinglist nomail
=================================================
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
=================================================
If you have any questions on how to change your
subscription options, email
[EMAIL PROTECTED]
=================================================

Reply via email to