As the volumes of data moving across WANs continue to increase, security of data is a growing concern. There is a strong recognition that this aspect of network infrastructure is vital to any businesses` health and well being.
Data security has many facets. The most obvious is to ensure that data is not stolen when it moves across the public Internet. The problem of securely moving data over the Internet was solved using Virtual Private Network technology. This technology established secure tunnels between sender and receiver and sends encrypted data packets. Typically, 128 bit or higher encryption is used.
Breaking the encrypted dataflow is very difficult but it has been done by determined hackers. Technology is available that enhances security and also provides WAN Redundancy. For example, FatPipe Networks markets a device, MPVPN, that allows multiple connections to the Internet. Encrypted data is broken down to the packet level and sent randomly over the multiple connections, where they are reassembled on the other side with virtually no latency. A hacker would have to get hold of all data lines, trap the data, put it in the correct sequence and then break the encryption. An almost impossible task.
Other areas of security involve employees keeping a post open on a network, thus allowing intruders access to the network. Constant vigilance is needed to prevent this.
Stolen laptops, data disks, etc., have also played a significant part in the breakdown of security. Even if the WAN is secure, such actions by employees can trigger a massive breach of security with sensitive data being lost. A corporate procedure that minimizes these possibilities is very desirable. Password protected laptops and well guarded data storage devices all have to form a part of the security regime in place.
The most insidious form of breach of WAN security is that caused by malevolent actions of past and present employees. This is oftentimes very hard to prevent but careful scrutiny of employee online actions, background checks and constant monitoring can minimize this. In some business, data security is of such concern that all LAN devices have disabled copying capabilities and in some cases employees are not allowed to take writing materials of any sort into secure rooms. Special clothing without pockets is also a technique used by some firms to enhance data security and it is within the gamete of WAN security.