Using thin client computing as security

JavaScript is disabled!

Please enable JavaScript to read this content.

Ict& Security/ By Muthoga Kioni

The vulnerabilities of laptop computers are well documented. Incidents of laptop theft and loss have caused severe damage to individuals and companies in Kenya. Lost or stolen, company issued laptops usually contain valuable data.

Traditional laptops, therefore, translate into a large risk exposure for local companies. Aside from lost information, organisations are exposed to significant costs in terms of regulatory fines. Legislation, for instance the Data Protection Act, will soon mete out serious penalties for companies that breach privacy codes.

The threat of identity theft and potential damage to a company’s reputation should compel Kenyan companies to radically rethink laptop security.

Using thin clients is an alternative that should be accorded serious consideration. The term thin client refers to a network of computers without a hard disk. This computer (and its software) is part of a network that acts as an interface while the network server computer does all the real work.

Thin client laptops contain enough information to start up and connect to the company’s network. It might have a hard disk and program/files are accessed and saved in the network server.

Security Advantage

The security advantages of thin client portable computing have prompted multinationals to increasingly deploy them. Various aspects are evident. Thin clients do not have a hard disk drive. As a result valuable data cannot be stolen. Virus infection is minimal because thin clients are XP embedded and have a Hyper Write Filter, which prevents any virus from installing itself locally. If infected, the ‘locked down’ mechanism means that a simple reboot removes any malicious code.

Apart from offering a lower risk of being stolen, thin laptops offer a secure environment for remote working because users access data over an encrypted network.

E-mail and Internet usage are two indispensable applications for the mobile worker. They are, therefore, targeted by malware. However, Microsoft Internet Explorer and Microsoft Outlook are more secure when server-based.

Data backups and restores are not necessary in thin computing because all the data is stored on the server and is managed by the enterprise backup strategy.

Thin computing demands a well developed ICT infrastructure with high data rates of Internet access in public networks. The current laying of fibre optic cabling in the country will go a long way in making thin computing a viable alternative to traditional laptops.

The writer is an ICT Security and Forensic Specialist. Email: [email protected]