![]() One approach is to carve your local network into two: a trusted and an untrusted network. On top of that, we also need to talk about how the “internet of things” and software firewalls affect what we do. This might be easy if your router supports it, or slightly more difficult if not. ![]() To protect one bucket from the others, we need to split the network. We’re coming to realize these devices are built with security as an afterthought, if at all. In recent years, more and more devices are getting connected to our internet to create the so-called “internet of things”. These are the computers and devices used by people who are less computer savvy, don’t understand safety, and/or are likely to do things that they shouldn’t, possibly resulting in malware infections. These are the computers and devices you control and can safely assume are being used by individuals who understand the basics of keeping a computer safe on the internet. We need to group the technology in your home into distinct buckets: When all else fails - and even when it doesn’t - the software firewall on your computer protects you from all the other devices connected to your network. Failing that, you might enlist help from your ISP to set up a separate network, or you can cobble together a protected scenario using two routers in sequence. Guest access, if supported by your router, is a great way to protect yourself from Wi-Fi-connected computers you don’t completely trust. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |