Good cybersecurity hygiene


According to the identity theft resource center, “Utilizing VPN's can drastically reduce those numbers, and I believe more and more people will understand that in the years to come.” It significantly reduces the risk of security breaches and cyber attacks as well.

The concept of a tunnel involves creating a stable channel between two computers or two networks to transmit data. When a user is “split tunneling” some of the data is running on a secured tunnel known as a virtual private network, or VPN, and some of the data is running on an open, unsecured tunnel. So, in a day and age with so many data risks and IT problems, why in the world would any still transmit data on an open channel at all? It’s a good question, but the fact is people still transfer a tremendous amount of information freely without any restriction on accessing it in transit.

With a split tunneling approach, you simplify your digital life and remove the complexity. Normally, folks have to set up a series of software features and hardware to provide a serious level of encryption protection on the information transferred. Other options involve having to working through secure website only, which of course reduces one’s flexibility to do work on the Internet.

In a split tunnel approach the security is already inherently provided by the split approach. The secure data runs on a VPN track while the not-so-sensitive material can move through unsecured channels. The beauty of this approach is that what doesn’t need to be secure can run freely on an Internet connection. For most people this is easily 75 percent of what they do digitally. However, for those on the move, the VPN provides the peace of mind that what needs to be protected gets taken care of. Whether you’re working out of a client’s conference room, a diner on the road between destinations, or your living room couch on the weekend, Whitelister is compatible with any situation where there is an Internet connection.