You have a small remote office with a limited number of users that needs to have network access to the corporate headquarters location. The remote site has an Internet connection, but you don’t want to connect your sites using an insecure public network. What’s the best technology for securing network connections between locations, even over public network links?
A) Access Control
B) Virtual Private Networking
C) WPA
D) Windows Encrypting File System
The answer: B) Virtual Private Networking
VPNs allow you to secure the connection between two locations. To create this secure link, two devices will connect to each other and create an encrypted “tunnel” that will be used to transfer all network traffic. Traffic inside of this virtual private tunnel is encrypted, protecting the contents of the data as it traverses through the public network.
Want to know more? Watch “Securing Data.” What are the most important aspects to remember for securing your organization’s important data? In this video, we’ll show you some useful best practices for securing data through such methods as access controls, event logging, encryption, password management, and incident reporting. |