Accessing your Network Remotely

The means by which your information systems network may be accessed from an external source. Remote access was traditionally provided by means of dial-up or leased phone lines. Today however, the Virtual Private Network provides access across public networks, e.g. the Internet.

To view the related Policy click      

  • Inadequate Internet Security safeguards can allow unauthorised access to your network, with potentially disastrous consequences.

  • Consider implementing a Virtual Private Network (VPN), to provide robust security using a combination of technologies, such as firewall and end to end encryption. See also PKI.
  • Weak dial-in security standards can give unauthorised access to your network, the consequences of which could be very serious.

  • Resist requests for remote access facilities unless they are essential.
  • Consider first a VPN (see above); but where dial up access is a better choice, ensure that 'auto dial back' is employed whenever possible.
  • Remove any unnecessary privileges which may be available on users' accounts and which are not essential when accessing remotely. Alternatively, consider issuing separate, restricted accounts, with limited privilege which are available specifically for remote access.
Previous PageTop of this pageNext Page

Information Security Policies from US$595


Use of the guidance contained within RUSecure™ is subject to the End User Licence Agreement
This site created with EasyHTMLHelp(tm) for MS Word


Next PageUpPrevious Page