Monday 11 May 2009

Split tunneling

Most corporate networks today are well protected and so hackers are increasingly targeting end point devices instead. This makes the task of protecting these devices and servers just as important. One key step when it comes to protecting information is to establish different security domains and avoid handling information of different sensitivities at the same time. For example you should not proofread the upcoming quarterly report whilst browsing eBay. Doing this turns your computer into a gateway between protected information and the unprotected Internet - an ideal starting point for information theft and other attacks. It's often referred to as the "split- tunnelling-problem". A simple solution is ensuring sure that there is a personal firewall on the PC with an automatic rule-set. When a user connects to a secure domain..all other un-secure traffic is prohibited. The word automatic is important, as users are too important to hassle with security issues

No comments: