Telecommunications Working from home Security and remote working can be a headache for digital nomads, and their clients or employers. If you’re a remote worker and have multiple clients, sometimes in different locations around the world, you may need to use different security applications for each of them. You will probably have to comply with multiple policies and regulations and may feel anxious about accessing and inadvertently compromising a client’s network. And, on the other hand, it is understandable if you are wary of giving up some of your own privacy to your employer (wang, qiao & lima, 2018) . It’s not just remote workers themselves who are at risk. Permanent employees who occasionally do work at home can face (and cause) security issues when remotely interfacing with an organization’s network. Let’s say we have a situation where our organization has 20 sales representatives working outside organization remotely. Case: Letter to CEO If we like to have remote team in our organization first we need to convince every one because there are several risks involved first we need to point the risk then has to come up with possible solutions Here in the letter we start with identification of risk. Here are some of the risks faced by the organization. Connection quality. If the user has a poor internet connection or a weak Wi-Fi signal, both of which are common at hotels or public hotspots for example, then the remote desktop connection will also be slow. Accessing applications or files becomes cumbersome. VPNs. VPNs, or virtual private networks, are very sensitive. Many public internet connections will not allow users to work at all, making remote connection almost impossible. Performance. There are many low-cost methods available, such as LogMeIn and GoToMyPC that simply do not have the speed necessary for accomplishing hours of work. The delays inherent in these solutions mean they are only viable options for quick tasks or small amounts of work. In addition, they may not allow for local file and printer access(Diekmann & Naab, 2019). Security. Public hotspots are common at coffee shops, airports, hotels, and even public parks. While they are convenient, they are also highly susceptible to hackers who would be able to access any of the data you’re working on while using the shared Wi-Fi. Application availability. Systems like Citrix and Terminal Server only allow access to certain programs that have been configured by the IT administrator. Often times, users need access to applications they installed themselves, special plugins, configurations, or files from their desktop, or other resources that are not on the remote access server. What’s more, these systems often work differently than the desktops. This change in habitual processes is inconvenient and sure to slow any user down. Open applications. If a user left files or applications open on their business desktop, they are locked there. It is impossible to log in to them a ...
Interactive Powerpoint_How to Master effective communication
Telecommunications Working from home Security and remote working ca
1. Telecommunications Working from home Security and remote
working can be a headache for digital nomads, and their clients
or employers. If you’re a remote worker and have multiple
clients, sometimes in different locations around the world, you
may need to use different security applications for each of them.
You will probably have to comply with multiple policies and
regulations and may feel anxious about accessing and
inadvertently compromising a client’s network. And, on the
other hand, it is understandable if you are wary of giving up
some of your own privacy to your employer (wang, qiao & lima,
2018) . It’s not just remote workers themselves who are at risk.
Permanent employees who occasionally do work at home can
face (and cause) security issues when remotely interfacing with
an organization’s network. Let’s say we have a situation where
our organization has 20 sales representatives working outside
organization remotely. Case: Letter to CEO If we like to have
remote team in our organization first we need to convince every
one because there are several risks involved first we need to
point the risk then has to come up with possible solutions Here
in the letter we start with identification of risk. Here are some
of the risks faced by the organizatio n. Connection quality. If
the user has a poor internet connection or a weak Wi-Fi signal,
both of which are common at hotels or public hotspots for
example, then the remote desktop connection will also be slow.
Accessing applications or files becomes cumbersome. VPNs.
VPNs, or virtual private networks, are very sensitive. Many
public internet connections will not allow users to work at all,
making remote connection almost impossible. Performance.
There are many low-cost methods available, such as LogMeIn
and GoToMyPC that simply do not have the speed necessary for
accomplishing hours of work. The delays inherent in these
solutions mean they are only viable options for quick tasks or
small amounts of work. In addition, they may not allow for
local file and printer access(Diekmann & Naab, 2019).
Security. Public hotspots are common at coffee shops, airports,
2. hotels, and even public parks. While they are convenient, they
are also highly susceptible to hackers who would be able to
access any of the data you’re working on while using the shared
Wi-Fi. Application availability. Systems like Citrix and
Terminal Server only allow access to certain programs that have
been configured by the IT administrator. Often times, users
need access to applications they installed themselves, special
plugins, configurations, or files from their desktop, or other
resources that are not on the remote access server. What’s more,
these systems often work differently than the desktops. This
change in habitual processes is inconvenie nt and sure to slow
any user down. Open applications. If a user left files or
applications open on their business desktop, they are locked
there. It is impossible to log in to them a second time from a
remote access system. These are the issues faced due to the
remote users using tools like wire shark, Firewalls, Anti -virus,
VPN, Backup plans, role-based access etc can solve the
problems Some tools and there functionality’s Pulseway offers
you total control of your PCs, no matter where from it is or
when it is. You can monitor and manage Windows, Mac
Operating Systems, and Linux as well as any application using
the monitoring API. It dramatically reduces the level of manual
checks for support engineers and provides them with a real time
status of their monitored systems. You are the first to know
about any potential issues affecting your systems and can
resolve those issues immediately(Diekmann & Naab, 2019).
Remotely monitor and control your IT systems Current
available memory and historical graphical usage Network
interfaces and traffic table state Current available memory and
usage history chart Status of web sites and application pools in
Internet Information Server SolarWinds Kiwi CatTools(A must
have for all small or low-budget companies) This tool comes
from the leading network management and analysis company,
“SolarWinds”; Kiwi CatTools supports automatic backup and
update activities for multivendor network devices. such as
Nortel routers, Cisco switches, and ASA firewalls with central
3. GUI-based network management. While resolving a network
issue, you can compare past and present configurations to find
the changes quickly. Kiwi CatTools can be installed on
Microsoft Servers or desktop Windows platforms so that you
can manage your network’s configurations from your computer
as well. References Wang, L., Yu, J., Qiao, B., Lima,
S., & Rocha, Á. (2018). Intelligent evaluation of computer
network security based on neural network. Journal of Intelligent
& Fuzzy Systems, 35(3), 2887–2891.
https://doi.org/10.3233/JIFS-169643 Diekmann, C., Naab,
J.Agile Network Access Control in the Container Age. (2019).
IEEE Transactions on Network and Service Management,
Network and Service Management, IEEE Transactions on, IEEE
Trans. Netw. Serv. Manage, (1), 41.
https://doi.org/10.1109/TNSM.2018.2889009 FEDERAL
BUILDING SECURITY: Actions Needed to Help Achieve
Vision for Secure, Interoperable Physical Access Control.
(2018). GAO Reports, 188. Retrieved from
http://search.ebscohost.com/login.aspx?direct=tr ue&AuthType=
shib&db=f5h&AN=133672481&site=eds-live