
No need to run it since we're all basically just sitting at home 95% of the time. No need to login from the kitchen.
We wish, for the last 10 years of my IT career I managed/supported eCommerce systems for a large multinational with all their north and south American businesses. We got hacked almost daily. It was so bad we had to implement the ASM module on our bigips. That was a nightmare to maintain as we had hundreds of internet facing apps, ASM is basically a layer 7 firewall that you sniff all the incoming traffic and all the outgoing traffic allow good traffic in and keep the bad traffic from passing either way. If someone wants into your systems there is NO way you can keep them out. Firewalls are pretty good, but not even close to perfect. -Bill
This post introduced an idea that hadn't passed my mind; obtaining the VPN-given IP from the BI pc and logging in via that IP while still at home.atreyu wrote: ↑Sat Jan 23, 2021 12:21 pm Many things to consider here. First, I would be wary of exposing your computers behind your router to the internet unless you have a decent awareness of network security. Are you port forwarding to your BI computer or is it “on the internet” through its ipv6 address? I would suggest restricting the firewall rules passing through your router to the bare minimum required.
General wisdom is to not expose your home services to the internet unless you truly need remote access. If you do, doing a VPN into your home network then accessing it “internally” is preferred. Easier to lock down that well used and studied VPN service than BI and your desktop Windows computer. A little clunky as you have to turn it on when out-and-about. One counter argument could be that opens a door to full access to your network if VPN is ever compromised. But again, a compromised BI computer could lead to the same situation.
Last, if you do want to expose it to the internet, use a random port. It’s security through obscurity (i.e. not great), but it may reduce some of the attempts.