In our recent post we talked about BYOD in our office environment and the flags that it raises for IT support providers and IT departments.
In our recent post we talked about BYOD in our office environment and the flags that it raises for IT support providers and IT departments. IT security is a number one concern for companies and organizations, or at least it should be! When users on your network are using smartphones and tablets that are not company issued or controlled, there must be a way to make them secure.
A computer security sandbox is a virtual computer environment that is contained on the disk of another computer. “Virtual” in this case implies a completely operable computer that is controlled by software, which looks and feels like a regular functioning computer, but is not. The sandbox is completely controlled and contained from the host computer.
If, for example, you are browsing the internet using a sandbox and a virus were to get by your firewall and your anti-virus security, then the virtual computer sandbox would contain that virus and delete it when the session is ended.
Sandbox method is a great tool to prevent such security breaches but it’s important to understand that using sandbox is just one particular layer of security. A layered security approach, it should be noted, is where the uses of several security components or layers keep malware and viruses away. The layers represent physical access to your computer, to a firewall and to your anti-virus protection. The point is to cover all tracks and not let any layer unprotected from all the different types of malware and viruses that are currently plaguing and compromising many IT infrastructures.
Sandbox security is available at no cost and has become very easy for less technical users to implement. One example is Sandboxie — recommended when you do a Google search for “best sandbox software.” If you choose not to use this approach then it is best to consult with an IT department or IT support provider to recommend which software is best for your IT environment.