TechWhirl (TECHWR-L) is a resource for technical writing and technical communications professionals of all experience levels and in all industries to share their experiences and acquire information.
For two decades, technical communicators have turned to TechWhirl to ask and answer questions about the always-changing world of technical communications, such as tools, skills, career paths, methodologies, and emerging industries. The TechWhirl Archives and magazine, created for, by and about technical writers, offer a wealth of knowledge to everyone with an interest in any aspect of technical communications.
Yes, we do that here, with limitations on which hardware can be
used to establish a VPN connection.
I understand that some companies make considerable use of
Citrix, and that could allow connection to corporate resources
from one's smartphone, rather than a company-issued/controlled
laptop. We don't.
> -----Original Message-----
> From: Margaret Cekis [mailto:Margaret -dot- Cekis -at- comcast -dot- net]
> Sent: November-16-12 1:23 PM
>
> Kevin McLauchlan asked if it is Possible to encrypt "free" mail?
> "But if anyone is going to access mail via web interface, while on-the-
> go,
> is that kind of security still possible? .... I have in mind dealing with
> contracting companies that have proprietary info they would need to
> share
> with a contracting techwriter who might not live in the company's
> office."
> ____________________________________
> Kevin
> I think where sensitive or proprietary information is involved,
> companies
> use VPNs (virtual private networks). These provide a secure channel
> to the
> corporate mail server, and you have to login and prove your identity,
> either
> with a password or an electronic key gadget that gives you a unique
> PIN each
> time you log in. Once the server verifies that you are authorized to
> connect, you can read or download your mail (and other documents,
> or even
> work remotely) over the internet as if you were actually in the
> building on
> the network. When you log off, your access is gone until you log in to
> VPN
> all over again.
> Margaret Cekis, Johns Creek GA
>
The information contained in this electronic mail transmission
may be privileged and confidential, and therefore, protected
from disclosure. If you have received this communication in
error, please notify us immediately by replying to this
message and deleting it from your computer without copying
or disclosing it.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Writer Tip: Create 10 different outputs with Doc-To-Help -- including Mobile and EPUB.