Remote Users Are The Weakest Link

Thursday, 20 February 2003, 1:28 AM EST

Say there's a remote worker who connects to the corporate net through a VPN, and to the Internet via broadband and a Wi-Fi hub. Is this user a threat to corporate data? You bet: That broadband link could be vulnerable to a hacker, who could then "piggyback" into the VPN.

That's just one of the remote-security scenarios that keeps IT security pros awake at night. With more and more employees telecommuting, guarding the remote links is turning into a major challenge.

But it doesn't have to be that way: Approach remote security with the same seriousness you treat mission-critical data, and you'll rest easier. For example, make sure remote users have a personal firewall. Keep their anti-virus software up to date. Instruct them on how to create hack-proof passwords—or better yet, get them to encrypt their files.

[ Read more ]




Spotlight

Chrome extension thwarts user profiling based on typing behavior

Infosec consultant Paul Moore came up with a working solution to thwart a type of behavioral profiling. The result is a Chrome extension called Keyboard Privacy, which prevents profiling of users by the way they type by randomizing the rate at which characters reach the DOM.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Wed, Jul 29th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //