How to Secure your Teleworkers with a VPN
by Harry Gostling - UK Country Manager for SonicWALL - Friday, 28 March 2003
To stay safe, SonicWALL recommends businesses should make sure their VPN solutions meet the following criteria:
  • Isolate the telecommuter connection - where the teleworker unit is on a shared network at home it should not be possible for the VPN tunnel to be accessible to anyone else on the home network
  • Enforce network protection at the telecommuter site - companies should consider giving teleworkers security levels at home that comply with the basic minimum corporate standards thereby enforcing a multi-layered defense mechanism that incorporates firewall, anti-virus, content filtering and authentication
  • Scale the telecommuting network infrastructure - the majority of enterprises will require VPN connections with many different users so it is important that the solution should be scalable to allow security measures to be deployed rapidly via a web browser
  • Manage telecommuting security policies - any solution must be capable of being managed remotely by the companyís service professionals so that the VPN links remain in full control of the organisation at all times
  • Perform stateful inspection - where malicious attacks are detected at the application layer rather than at operating system level
  • Comply with standards - IPSec, ICSA certification and PKI

Spotlight

USBdriveby: Compromising computers with a $20 microcontroller

Posted on 19 December 2014.  |  Security researcher Samy Kamkar has devised a fast and easy way to compromise an unlocked computer and open a backdoor on it: a simple and cheap ($20) pre-programmed Teensy microcontroller.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Dec 19th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //