Hacker News new | past | comments | ask | show | jobs | submit login

> The policy at my previous employer (we handled a lot of extremely sensitive information), was pretty draconian: data never leaves a company desktop, laptop, or blackberry.

Really? And how do these devices inter-communicate if data never leaves from anywhere to anywhere?

Burying a laptop to the ground would make it safe enough to keep out the bad guys.




> Burying a laptop to the ground would make it safe enough to keep out the bad guys.

That will just drive the bad guys underground.


You can use citrix or terminal services so the sensitive data never leaves the servers.


Couldn't someone just screenshot the citrix or terminal services session while the user is using it?


Sure, but that only gets you one screen of a sensitive document, and is a lot harder to do inconspicuously than to surreptitiously look at a file that a user saved to his personal laptop's desktop with the filename "Details of Unannounced IPO.doc."




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: