Protect Your Information: Remote Access Security

If you use remote access, you need to concern yourself with security. Threats to your security can be sophisticated, such as an eavesdropper intercepting data over the Internet and reconstructing it to read email and other sensitive information. Or the threats can be something more ordinary, such as someone watching your computer screen in the office as you connect to it from home. For businesses, the threat can be even more insidious, with hackers gaining access to entire networks. The list of potential security threats to your information is lengthy, and an improperly implemented remote access solution can open the door to any or all of them.

One of the most common threats is losing confidential ...

Get Online! The Book now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.