Obviously, in the current format, if a compromised disc is inserted in to an employee's workstation, the entire network could potentially be infected within minutes. Employee uploads extracted data to our internal system.Employee receives a disc and inserts it in to their workstation.Is there any way that we can safely process these discs without too much (or any!) additional effort? While we can generally trust the sources, we don't want to run the risk of introducing any form of malware in to our internal networks and systems. Here is the conundrum: At my current company, we process physical discs from numerous third party sources and extract the data from them to ingest to our own system.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |