This blog was written by an independent guest blogger.
Someone you don’t know walks into your office and sits down at a computer. Maybe that computer is a corporate desktop assigned to a mid-level manager or to a member of your IT department. Maybe it’s a personally owned laptop used by a contractor.
That unknown person plugs a USB dongle into that computer, installs some software (typing in the correct password, if requested), runs that software, and walks away.
No problem, right?
Of course, that’s a problem. Yet that’s what happens every minute of every hour of every day when your workers use the Internet. Every animation from a Web-based business application is, in fact, software that’s downloaded and executed on that laptop or desktop. Each advertising network installs and runs software on the local computer. Every browser plug-in…