• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 20. The Ten-Step Commute > Protect Your Information: Remote Access Secu...

Protect Your Information: Remote Access Security

If you use remote access, you need to concern yourself with security. Threats to your security can be sophisticated, such as an eavesdropper intercepting data over the Internet and reconstructing it to read email and other sensitive information. Or the threats can be something more ordinary, such as someone watching your computer screen in the office as you connect to it from home. For businesses, the threat can be even more insidious, with hackers gaining access to entire networks. The list of potential security threats to your information is lengthy, and an improperly implemented remote access solution can open the door to any or all of them.

One of the most common threats is losing confidential information to intruders. Corporate espionage and hacking, whether for fun or profit, is a very real threat in today's business world. Once hackers gain access to your network or computer, they can poke around, read private information, or delete files at will. The proliferation of newer technologies such as wireless networks makes the threats more widespread. You need to make sure any remote access solution you choose, whether it's a remote control product or a VPN, provides adequate security to block intruders from your network or computer.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint