While in theory your data should be safe, I never like to have any sensitive/critical data open on the Internet. You are just inviting hackers to attack you. Personally, I would look to using a reverse proxy or multi-tier DMZ with DWA access to do this. There are also appliances, such as the one from Whale Communications, that can perform this function.
Dig Deeper on Lotus Notes Domino Firewalls
In the 1970s, Martin Hellman and Whitfield Diffie wrote the recipe for one of today's most widely used security algorithms in a paper called "New Directions in Cryptography." The paper mapped out the Diffie-Hellman key exchange, a major advancement in Public Key Infrastructure (PKI) technology that allows for secure online transactions and is used in such popular protocols as the Secure Sockets Layer (SSL) and Secure Shell (SSH). In 2000, they received the prestigious Marconi Foundation award for their contributions.
With the world increasingly dependent on the Internet for commerce, and a financially-motivated underground of malcode writers working overtime to exploit its weaknesses, there's been plenty of debate over how cryptography must evolve to meet new threats. In this two-part feature, Diffie and Hellman discuss the threats that concern them most and where they think the technology they helped advance is headed.
Part 1: Hellman, now professor emeritus of electrical engineering at Stanford University, explains why phishing is one of the biggest threats we face, why strong authentication is needed at every access point and why security add-ons won't do much to ease the threats of cyberspace.
Related Q&A from Michael Lazar
Learn how to easily keep track of the numbers of incoming and outgoing Lotus Notes email messages to and from your Domino server each day. Continue Reading
Discover what steps you can take if your Lotus Domino server runs out of disk space and you have issues sending and receiving Lotus Notes email ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.