Securing Teleworker Networks
by Lisa Phifer
Posted 5/2004; Published 10/2003

 

Abstract:

 

Teleworkers push the enterprise security perimeter well beyond the corporate firewall. Always-on residential broadband and wireless services expose home networks to near-continuous probing. Once discovered, unprotected home networks make for easy attack targets. Work-at-home PCs that are compromised can expose confidential data and create back doors. Without appropriate safeguards, mass mailing worms like SoBig and remote access trojans like SubSeven can ride remote access connections right into the company intranet.

 

For all but the most security-sensitive facilities, cutting off teleworker access is simply unthinkable. Instead, most IT departments try to beef up teleworker security with VPN and anti-virus software. But as teleworker nodes morph into teleworker networks, should your security strategy change? Could you be doing more—or spending less—to eliminate these weak links in your corporate network’s protective armor?

 

Whether your company simply provides best practice guidelines, recommends products, purchases products for teleworkers or actively installs and manages them, technologies like those described in this article can help you adapt your existing defenses to address new teleworker threats.

 

About the author:

Lisa Phifer is vice president of Core Competence, Inc., a network security consulting firm based in Chester Springs, PA.

 

bullet

Access paper
bullet

Approx. 229 kB

bullet

For help with .pdf file downloads, please check out the help topic.

bullet

Return to Business Communications Review Gold Sponsor Archives

bullet

Return to Security Webtorials menu


This article is reproduced by special arrangement with our partner, Business Communications Review.

 

Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information.  Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site.  Please encourage colleagues to download their own copy after registering at http://www.webtorials.com/reg/.