How can you secure your computer’s hardware configuration?

You’re planning to disable the USB port on all of the computers in your organization, but you’re concerned about your end user community re-enabling the ports on individual systems. What’s the easiest way to ensure that the hardware changes are protected from any end-user modifications?

How can you secure data between sites?

You have a small remote office with a limited number of users that needs to have network access to the corporate headquarters location. The remote site has an Internet connection, but you don’t want to connect your sites using an insecure public network. What’s the best technology for securing network connections between locations, even over public network links?