Quote:
Originally Posted by Sephiroth
I don't disagree. But the "properly in hand" includes, for example tying access to an IP address, or multi-factor authentication using a corporate mobile device. It's confidential information that concerns me.
|
Encryption & MFA are two small components. device trust/posture and conditional access are even more important. Steal a laptop ? Check. Got the password ? Check. Got the MFA device ? Check. Coming from an unknown or unapproved IP? Denied.
There’s so much going on behind the scenes you’re not even aware of.
I did some work for Selby council many years ago and they had all of that in place then…… as did many other councils in yorkshire /Lancashire