Some executives may have difficulty naming the specific safeguards that their companies deploy. This guide aims to shed some light on some of the more common aspects of computer security. It also serves as a checklist to identify potential areas upon which to improve. A VPN channels all network traffic through an encrypted tunnel back to the trusted corporate network. An intrusion detection system (IDS) is a network-centric strategy that involves monitoring traffic for suspicious activities that may indicate that the corporate network has been compromised. A VPN can be complex for a small business to deploy, and is costly to support due to the overheads of authentication, processing and bandwidth.”]

