Events


Recap: 6 Things to Know Before Employees 'Remote In'

July 19, 2017

DTCI Lunch and Learn Recap

July 18, 2017

 

Welcome – today’s presenter, Bob McNutt, President of DTCI, Desktop Consulting, Inc.

 

Today’s agenda

  • Best practice surrounding remote in policies
  • How to ‘remote in’
  • Security of your business
  • Home internet and WiFi
  • Home machine’s patching and compatibility issues
  • Anti-Virus

Presentation Slide Show

 

Best Practices surrounding ‘remote in’ policies

  • Home Users – defined as working at home some days on various hours, but also working from the office.
  • Work from home User – defined as primarily working at home.  Minimum or no work from office. 
  • Employee performance is numerically evaluated
  • Employee who has been with company for several years and understands company policies, culture and dynamics good candidate for work from home employee.
  • There is no ‘one size fits all’ for good candidate.
  • Honest conversations between ownership and employee very important.

Ways to remote in

  • Direct Connect – more secure as there is no third party used in data transfer path.  Requires expert installation.
    • VPN – Virtual Private Networking sends information securely through the internet.  Information travels directly from network to remote device.
    • RDP – Remote Desktop Protocol gives a graphical interface to connect to another computer over a network connection.  Microsofts’s RDP client software is used for this purpose.
  • Purchase internet based service – cloud based applications such as LogMeIn.  Data travels from network to cloud application to end user.  Slower and less secure.  

Home internet and WiFi

  • Different ISPs (Internet Service Providers), like Comcast, CenturyLink, and CBN, have products that have different data speed transfers.  This will impact work at home productivity dramatically. 
  • For remote locations ISP may only be available through a WiFi service like Rize or Kellen.  This type of service is dramatically less expensive to implement through ‘beaming of data’ vs running wires and cabling.  However, data transfer is very slow.

Home machines

  • Consistent downloading of software updates crucial to security of device that accesses business data.  If auto update is set on computer consistent monitoring is still needed as auto update can be disabled without warning.
  • Home equipment must have antivirus installed and updated consistently.  Firewall requires annual renewal.
  • Who owns home machines?  Under business ownership policies can be implemented such as:
    • Equipment for employee use only – no access to children, games, download of unauthorized programs
    • Monitor updates and patching
    • What data will be allowed
    • Monitor and manage internet access
    • Equipment and data retention upon employee separation
  • Best, but more expensive way, terminal and firewall installed for work from home employee.

Security

  • Misperceptions about data in cloud.
    1. Increased ease of accessibility but double responsibility to protecting data.  Business must take ownership of data protection and not rely on cloud provider/application to backup and easily provide restore functionality. 
    2. Even the big cloud providers (Google) can and have been hacked.
  • Six (or seven) must haves for security of business
    1. Antivirus/Malware software on all computers that access business data.  Update consistently and purchase annual renewal.
    2. Windows updates – monitored regularly.  10-15% of auto updates stop working.  If using older version of Windows (XP), upgrade is a must.
    3. Driver and Firmware regular updates.
    4. Content filtering – what does internet access look like?  Take control.
    5. Know the ages of business asset/technology.  Older assets increase vulnerability. 
    6. Monitor network ports.
    7. Back up?  Do you care.  Not as much as you care about data restoration.  Restore functionality has to be monitored and verified regularly.

Under DTCI Management, processes are implemented to consistently monitor these important business continuity aspects of technology. 

 

We appreciate input and participation from attendees! 

 

Stay tuned for our next learning opportunity.  If you’d like to be added to the invite list, let us know

 

 




Return to Events Main Page







=)