Protect your sensitive information with this solution.



We suggest this for those considering the security of their confidential information.

Run a computer that is completely isolated from your network. This prevents anyone on your work network from being able to access your computer. This approach is commonly used today for managing sensitive documents. Examples would be accounting, salary information and online banking. Large organisations use this approach because it's impossible to be sure what anyone on the network has access to.

I use this isolated approach at home to protect other computers from viruses my kids inadvertently get. This makes it almost impossible for a virus to spread to other home computers as they are not connected to the same network.

A laptop is a good option for an isolated computer. In the morning, you connect it to the internet at work and use it for private or sensitive work. At the end of the day, unplug the computer and take it home.

If you need to transfer information between your Point of Sale (POS) system and your isolated computer, I recommend you use a USB stick rather than the network. This will reduce your sensitive data risk.

While using an isolated computer can help mitigate online threats and safeguard your identity and data, remember that no security measure is foolproof.

It's crucial to remain vigilant and cautious when using any computer online because no security measure can guarantee 100%.

Add new comment

Restricted HTML

  • Allowed HTML tags: <a href hreflang> <em> <strong> <cite> <blockquote cite> <code> <ul type> <ol start type> <li> <dl> <dt> <dd> <h2 id> <h3 id> <h4 id> <h5 id> <h6 id>
  • Lines and paragraphs break automatically.
  • Web page addresses and email addresses turn into links automatically.
CAPTCHA This question is for testing whether or not you are a human visitor and to prevent automated spam submissions. Image CAPTCHA
Enter the characters shown in the image.