SLIDE 47 47
TOR
“Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: It prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol”.
So – to wrap up on security
▪ Install firewalls onto your IT systems to prevent outside
parties from gaining access to information
▪ Keep anti-virus and anti-spyware software up-to-date and
download the latest security updates
▪ Use encryption to protect information contained in emails or
stored on laptops or other portable devices such as memory sticks or PDAs
▪ Destroy old computers, backup tapes memory sticks etc using
a specialist 'shredding' application or seek the services of a reputable third party contractor
▪ Clear out temporary Internet files, cache and history files (also
monitor third party cookies)...