SlideShare a Scribd company logo
1 of 3
Telecommunications Working from home Security and remote
working can be a headache for digital nomads, and their clients
or employers. If you’re a remote worker and have multiple
clients, sometimes in different locations around the world, you
may need to use different security applications for each of them.
You will probably have to comply with multiple policies and
regulations and may feel anxious about accessing and
inadvertently compromising a client’s network. And, on the
other hand, it is understandable if you are wary of giving up
some of your own privacy to your employer (wang, qiao & lima,
2018) . It’s not just remote workers themselves who are at risk.
Permanent employees who occasionally do work at home can
face (and cause) security issues when remotely interfacing with
an organization’s network. Let’s say we have a situation where
our organization has 20 sales representatives working outside
organization remotely. Case: Letter to CEO If we like to have
remote team in our organization first we need to convince every
one because there are several risks involved first we need to
point the risk then has to come up with possible solutions Here
in the letter we start with identification of risk. Here are some
of the risks faced by the organizatio n. Connection quality. If
the user has a poor internet connection or a weak Wi-Fi signal,
both of which are common at hotels or public hotspots for
example, then the remote desktop connection will also be slow.
Accessing applications or files becomes cumbersome. VPNs.
VPNs, or virtual private networks, are very sensitive. Many
public internet connections will not allow users to work at all,
making remote connection almost impossible. Performance.
There are many low-cost methods available, such as LogMeIn
and GoToMyPC that simply do not have the speed necessary for
accomplishing hours of work. The delays inherent in these
solutions mean they are only viable options for quick tasks or
small amounts of work. In addition, they may not allow for
local file and printer access(Diekmann & Naab, 2019).
Security. Public hotspots are common at coffee shops, airports,
hotels, and even public parks. While they are convenient, they
are also highly susceptible to hackers who would be able to
access any of the data you’re working on while using the shared
Wi-Fi. Application availability. Systems like Citrix and
Terminal Server only allow access to certain programs that have
been configured by the IT administrator. Often times, users
need access to applications they installed themselves, special
plugins, configurations, or files from their desktop, or other
resources that are not on the remote access server. What’s more,
these systems often work differently than the desktops. This
change in habitual processes is inconvenie nt and sure to slow
any user down. Open applications. If a user left files or
applications open on their business desktop, they are locked
there. It is impossible to log in to them a second time from a
remote access system. These are the issues faced due to the
remote users using tools like wire shark, Firewalls, Anti -virus,
VPN, Backup plans, role-based access etc can solve the
problems Some tools and there functionality’s Pulseway offers
you total control of your PCs, no matter where from it is or
when it is. You can monitor and manage Windows, Mac
Operating Systems, and Linux as well as any application using
the monitoring API. It dramatically reduces the level of manual
checks for support engineers and provides them with a real time
status of their monitored systems. You are the first to know
about any potential issues affecting your systems and can
resolve those issues immediately(Diekmann & Naab, 2019).
Remotely monitor and control your IT systems Current
available memory and historical graphical usage Network
interfaces and traffic table state Current available memory and
usage history chart Status of web sites and application pools in
Internet Information Server SolarWinds Kiwi CatTools(A must
have for all small or low-budget companies) This tool comes
from the leading network management and analysis company,
“SolarWinds”; Kiwi CatTools supports automatic backup and
update activities for multivendor network devices. such as
Nortel routers, Cisco switches, and ASA firewalls with central
GUI-based network management. While resolving a network
issue, you can compare past and present configurations to find
the changes quickly. Kiwi CatTools can be installed on
Microsoft Servers or desktop Windows platforms so that you
can manage your network’s configurations from your computer
as well. References Wang, L., Yu, J., Qiao, B., Lima,
S., & Rocha, Á. (2018). Intelligent evaluation of computer
network security based on neural network. Journal of Intelligent
& Fuzzy Systems, 35(3), 2887–2891.
https://doi.org/10.3233/JIFS-169643 Diekmann, C., Naab,
J.Agile Network Access Control in the Container Age. (2019).
IEEE Transactions on Network and Service Management,
Network and Service Management, IEEE Transactions on, IEEE
Trans. Netw. Serv. Manage, (1), 41.
https://doi.org/10.1109/TNSM.2018.2889009 FEDERAL
BUILDING SECURITY: Actions Needed to Help Achieve
Vision for Secure, Interoperable Physical Access Control.
(2018). GAO Reports, 188. Retrieved from
http://search.ebscohost.com/login.aspx?direct=tr ue&AuthType=
shib&db=f5h&AN=133672481&site=eds-live

More Related Content

Similar to Telecommunications Working from home  Security and remote working ca

Evolution of #cloud computing
Evolution of #cloud computingEvolution of #cloud computing
Evolution of #cloud computingCirro
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Securityarms8586
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfInfinityGroup5
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principlesardexateam
 
5 benefits of network monitoring
5 benefits of network monitoring5 benefits of network monitoring
5 benefits of network monitoringFlightcase1
 
End-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shiftEnd-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shiftUni Systems S.M.S.A.
 
Why Should Nonprofits Care About Cloud Computing
Why Should Nonprofits Care About Cloud ComputingWhy Should Nonprofits Care About Cloud Computing
Why Should Nonprofits Care About Cloud ComputingTechSoup Global
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxrtodd599
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxjeffsrosalyn
 
LogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdf
LogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdfLogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdf
LogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdfaradhana9856
 
How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...
How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...
How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...Dana Gardner
 
1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdf1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdfexpressionnoveltiesk
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterpriseinfra-si
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingAllwyn24
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications Array Networks
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloudtcarrucan
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxArrow ECS UK
 

Similar to Telecommunications Working from home  Security and remote working ca (20)

Evolution of #cloud computing
Evolution of #cloud computingEvolution of #cloud computing
Evolution of #cloud computing
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
 
5 benefits of network monitoring
5 benefits of network monitoring5 benefits of network monitoring
5 benefits of network monitoring
 
End-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shiftEnd-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shift
 
Why Should Nonprofits Care About Cloud Computing
Why Should Nonprofits Care About Cloud ComputingWhy Should Nonprofits Care About Cloud Computing
Why Should Nonprofits Care About Cloud Computing
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
LogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdf
LogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdfLogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdf
LogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdf
 
How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...
How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...
How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...
 
1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdf1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdf
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
 
Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417
 
Up in the Clouds
Up in the CloudsUp in the Clouds
Up in the Clouds
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
cloud-computing
cloud-computingcloud-computing
cloud-computing
 

More from alehosickg3

Watch the movie Dirt. Write a note. The notes do not have to be in .docx
Watch the movie Dirt. Write a note. The notes do not have to be in .docxWatch the movie Dirt. Write a note. The notes do not have to be in .docx
Watch the movie Dirt. Write a note. The notes do not have to be in .docxalehosickg3
 
Watch the PBS video, States Grapple with Funding Education amid Bu.docx
Watch the PBS video, States Grapple with Funding Education amid Bu.docxWatch the PBS video, States Grapple with Funding Education amid Bu.docx
Watch the PBS video, States Grapple with Funding Education amid Bu.docxalehosickg3
 
Watch the 1985 movie Fletch, starring Chevy Chase, and write.docx
Watch the 1985 movie Fletch, starring Chevy Chase, and write.docxWatch the 1985 movie Fletch, starring Chevy Chase, and write.docx
Watch the 1985 movie Fletch, starring Chevy Chase, and write.docxalehosickg3
 
Watch the documentary and answer one or more of the following qu.docx
Watch the documentary and answer one or more of the following qu.docxWatch the documentary and answer one or more of the following qu.docx
Watch the documentary and answer one or more of the following qu.docxalehosickg3
 
Watch one or more of the following videos discussing randomness, sta.docx
Watch one or more of the following videos discussing randomness, sta.docxWatch one or more of the following videos discussing randomness, sta.docx
Watch one or more of the following videos discussing randomness, sta.docxalehosickg3
 
Watch one of the following moviesA Beautiful Mind (2001).docx
Watch one of the following moviesA Beautiful Mind (2001).docxWatch one of the following moviesA Beautiful Mind (2001).docx
Watch one of the following moviesA Beautiful Mind (2001).docxalehosickg3
 
Watch BNET Videos video titled Modernizing Inventory Management o.docx
Watch BNET Videos video titled Modernizing Inventory Management o.docxWatch BNET Videos video titled Modernizing Inventory Management o.docx
Watch BNET Videos video titled Modernizing Inventory Management o.docxalehosickg3
 
Was the Scientific Revolution intended to be a war on tradition and .docx
Was the Scientific Revolution intended to be a war on tradition and .docxWas the Scientific Revolution intended to be a war on tradition and .docx
Was the Scientific Revolution intended to be a war on tradition and .docxalehosickg3
 
WarehousingCompanies use cross-docking to improve the performanc.docx
WarehousingCompanies use cross-docking to improve the performanc.docxWarehousingCompanies use cross-docking to improve the performanc.docx
WarehousingCompanies use cross-docking to improve the performanc.docxalehosickg3
 
War and Peace Please respond to the followingBased on the lect.docx
War and Peace Please respond to the followingBased on the lect.docxWar and Peace Please respond to the followingBased on the lect.docx
War and Peace Please respond to the followingBased on the lect.docxalehosickg3
 
Wang, Woo, Choon, Quek, Yang, and Liu (2012) found that using Facebo.docx
Wang, Woo, Choon, Quek, Yang, and Liu (2012) found that using Facebo.docxWang, Woo, Choon, Quek, Yang, and Liu (2012) found that using Facebo.docx
Wang, Woo, Choon, Quek, Yang, and Liu (2012) found that using Facebo.docxalehosickg3
 
W4 Assignment DeterrenceIntroduction to CriminologyCrime and C.docx
W4 Assignment DeterrenceIntroduction to CriminologyCrime and C.docxW4 Assignment DeterrenceIntroduction to CriminologyCrime and C.docx
W4 Assignment DeterrenceIntroduction to CriminologyCrime and C.docxalehosickg3
 
Vulnerable Population Summary and Proposed ProgramThe first of you.docx
Vulnerable Population Summary and Proposed ProgramThe first of you.docxVulnerable Population Summary and Proposed ProgramThe first of you.docx
Vulnerable Population Summary and Proposed ProgramThe first of you.docxalehosickg3
 
Voices of DemocracyThe documents created at the inception of Ameri.docx
Voices of DemocracyThe documents created at the inception of Ameri.docxVoices of DemocracyThe documents created at the inception of Ameri.docx
Voices of DemocracyThe documents created at the inception of Ameri.docxalehosickg3
 
Vital statistics collected by federal, state, & local governments ar.docx
Vital statistics collected by federal, state, & local governments ar.docxVital statistics collected by federal, state, & local governments ar.docx
Vital statistics collected by federal, state, & local governments ar.docxalehosickg3
 
Visual Representation and Analysis of DataStateTotal.docx
Visual Representation and Analysis of DataStateTotal.docxVisual Representation and Analysis of DataStateTotal.docx
Visual Representation and Analysis of DataStateTotal.docxalehosickg3
 
Vladimir Putin was recently reelected to another term as President o.docx
Vladimir Putin was recently reelected to another term as President o.docxVladimir Putin was recently reelected to another term as President o.docx
Vladimir Putin was recently reelected to another term as President o.docxalehosickg3
 
Vissing (2011) explains culture as an organized system of living an.docx
Vissing (2011) explains culture as an organized system of living an.docxVissing (2011) explains culture as an organized system of living an.docx
Vissing (2011) explains culture as an organized system of living an.docxalehosickg3
 
Visit the Endeavour Space Shuttle (I Already went there) at the .docx
Visit the Endeavour Space Shuttle (I Already went there) at the .docxVisit the Endeavour Space Shuttle (I Already went there) at the .docx
Visit the Endeavour Space Shuttle (I Already went there) at the .docxalehosickg3
 
Visit the Endeavour Space Shuttle (any day) at the Science Cente.docx
Visit the Endeavour Space Shuttle (any day) at the Science Cente.docxVisit the Endeavour Space Shuttle (any day) at the Science Cente.docx
Visit the Endeavour Space Shuttle (any day) at the Science Cente.docxalehosickg3
 

More from alehosickg3 (20)

Watch the movie Dirt. Write a note. The notes do not have to be in .docx
Watch the movie Dirt. Write a note. The notes do not have to be in .docxWatch the movie Dirt. Write a note. The notes do not have to be in .docx
Watch the movie Dirt. Write a note. The notes do not have to be in .docx
 
Watch the PBS video, States Grapple with Funding Education amid Bu.docx
Watch the PBS video, States Grapple with Funding Education amid Bu.docxWatch the PBS video, States Grapple with Funding Education amid Bu.docx
Watch the PBS video, States Grapple with Funding Education amid Bu.docx
 
Watch the 1985 movie Fletch, starring Chevy Chase, and write.docx
Watch the 1985 movie Fletch, starring Chevy Chase, and write.docxWatch the 1985 movie Fletch, starring Chevy Chase, and write.docx
Watch the 1985 movie Fletch, starring Chevy Chase, and write.docx
 
Watch the documentary and answer one or more of the following qu.docx
Watch the documentary and answer one or more of the following qu.docxWatch the documentary and answer one or more of the following qu.docx
Watch the documentary and answer one or more of the following qu.docx
 
Watch one or more of the following videos discussing randomness, sta.docx
Watch one or more of the following videos discussing randomness, sta.docxWatch one or more of the following videos discussing randomness, sta.docx
Watch one or more of the following videos discussing randomness, sta.docx
 
Watch one of the following moviesA Beautiful Mind (2001).docx
Watch one of the following moviesA Beautiful Mind (2001).docxWatch one of the following moviesA Beautiful Mind (2001).docx
Watch one of the following moviesA Beautiful Mind (2001).docx
 
Watch BNET Videos video titled Modernizing Inventory Management o.docx
Watch BNET Videos video titled Modernizing Inventory Management o.docxWatch BNET Videos video titled Modernizing Inventory Management o.docx
Watch BNET Videos video titled Modernizing Inventory Management o.docx
 
Was the Scientific Revolution intended to be a war on tradition and .docx
Was the Scientific Revolution intended to be a war on tradition and .docxWas the Scientific Revolution intended to be a war on tradition and .docx
Was the Scientific Revolution intended to be a war on tradition and .docx
 
WarehousingCompanies use cross-docking to improve the performanc.docx
WarehousingCompanies use cross-docking to improve the performanc.docxWarehousingCompanies use cross-docking to improve the performanc.docx
WarehousingCompanies use cross-docking to improve the performanc.docx
 
War and Peace Please respond to the followingBased on the lect.docx
War and Peace Please respond to the followingBased on the lect.docxWar and Peace Please respond to the followingBased on the lect.docx
War and Peace Please respond to the followingBased on the lect.docx
 
Wang, Woo, Choon, Quek, Yang, and Liu (2012) found that using Facebo.docx
Wang, Woo, Choon, Quek, Yang, and Liu (2012) found that using Facebo.docxWang, Woo, Choon, Quek, Yang, and Liu (2012) found that using Facebo.docx
Wang, Woo, Choon, Quek, Yang, and Liu (2012) found that using Facebo.docx
 
W4 Assignment DeterrenceIntroduction to CriminologyCrime and C.docx
W4 Assignment DeterrenceIntroduction to CriminologyCrime and C.docxW4 Assignment DeterrenceIntroduction to CriminologyCrime and C.docx
W4 Assignment DeterrenceIntroduction to CriminologyCrime and C.docx
 
Vulnerable Population Summary and Proposed ProgramThe first of you.docx
Vulnerable Population Summary and Proposed ProgramThe first of you.docxVulnerable Population Summary and Proposed ProgramThe first of you.docx
Vulnerable Population Summary and Proposed ProgramThe first of you.docx
 
Voices of DemocracyThe documents created at the inception of Ameri.docx
Voices of DemocracyThe documents created at the inception of Ameri.docxVoices of DemocracyThe documents created at the inception of Ameri.docx
Voices of DemocracyThe documents created at the inception of Ameri.docx
 
Vital statistics collected by federal, state, & local governments ar.docx
Vital statistics collected by federal, state, & local governments ar.docxVital statistics collected by federal, state, & local governments ar.docx
Vital statistics collected by federal, state, & local governments ar.docx
 
Visual Representation and Analysis of DataStateTotal.docx
Visual Representation and Analysis of DataStateTotal.docxVisual Representation and Analysis of DataStateTotal.docx
Visual Representation and Analysis of DataStateTotal.docx
 
Vladimir Putin was recently reelected to another term as President o.docx
Vladimir Putin was recently reelected to another term as President o.docxVladimir Putin was recently reelected to another term as President o.docx
Vladimir Putin was recently reelected to another term as President o.docx
 
Vissing (2011) explains culture as an organized system of living an.docx
Vissing (2011) explains culture as an organized system of living an.docxVissing (2011) explains culture as an organized system of living an.docx
Vissing (2011) explains culture as an organized system of living an.docx
 
Visit the Endeavour Space Shuttle (I Already went there) at the .docx
Visit the Endeavour Space Shuttle (I Already went there) at the .docxVisit the Endeavour Space Shuttle (I Already went there) at the .docx
Visit the Endeavour Space Shuttle (I Already went there) at the .docx
 
Visit the Endeavour Space Shuttle (any day) at the Science Cente.docx
Visit the Endeavour Space Shuttle (any day) at the Science Cente.docxVisit the Endeavour Space Shuttle (any day) at the Science Cente.docx
Visit the Endeavour Space Shuttle (any day) at the Science Cente.docx
 

Recently uploaded

internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Recently uploaded (20)

OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 

Telecommunications Working from home  Security and remote working ca

  • 1. Telecommunications Working from home Security and remote working can be a headache for digital nomads, and their clients or employers. If you’re a remote worker and have multiple clients, sometimes in different locations around the world, you may need to use different security applications for each of them. You will probably have to comply with multiple policies and regulations and may feel anxious about accessing and inadvertently compromising a client’s network. And, on the other hand, it is understandable if you are wary of giving up some of your own privacy to your employer (wang, qiao & lima, 2018) . It’s not just remote workers themselves who are at risk. Permanent employees who occasionally do work at home can face (and cause) security issues when remotely interfacing with an organization’s network. Let’s say we have a situation where our organization has 20 sales representatives working outside organization remotely. Case: Letter to CEO If we like to have remote team in our organization first we need to convince every one because there are several risks involved first we need to point the risk then has to come up with possible solutions Here in the letter we start with identification of risk. Here are some of the risks faced by the organizatio n. Connection quality. If the user has a poor internet connection or a weak Wi-Fi signal, both of which are common at hotels or public hotspots for example, then the remote desktop connection will also be slow. Accessing applications or files becomes cumbersome. VPNs. VPNs, or virtual private networks, are very sensitive. Many public internet connections will not allow users to work at all, making remote connection almost impossible. Performance. There are many low-cost methods available, such as LogMeIn and GoToMyPC that simply do not have the speed necessary for accomplishing hours of work. The delays inherent in these solutions mean they are only viable options for quick tasks or small amounts of work. In addition, they may not allow for local file and printer access(Diekmann & Naab, 2019). Security. Public hotspots are common at coffee shops, airports,
  • 2. hotels, and even public parks. While they are convenient, they are also highly susceptible to hackers who would be able to access any of the data you’re working on while using the shared Wi-Fi. Application availability. Systems like Citrix and Terminal Server only allow access to certain programs that have been configured by the IT administrator. Often times, users need access to applications they installed themselves, special plugins, configurations, or files from their desktop, or other resources that are not on the remote access server. What’s more, these systems often work differently than the desktops. This change in habitual processes is inconvenie nt and sure to slow any user down. Open applications. If a user left files or applications open on their business desktop, they are locked there. It is impossible to log in to them a second time from a remote access system. These are the issues faced due to the remote users using tools like wire shark, Firewalls, Anti -virus, VPN, Backup plans, role-based access etc can solve the problems Some tools and there functionality’s Pulseway offers you total control of your PCs, no matter where from it is or when it is. You can monitor and manage Windows, Mac Operating Systems, and Linux as well as any application using the monitoring API. It dramatically reduces the level of manual checks for support engineers and provides them with a real time status of their monitored systems. You are the first to know about any potential issues affecting your systems and can resolve those issues immediately(Diekmann & Naab, 2019). Remotely monitor and control your IT systems Current available memory and historical graphical usage Network interfaces and traffic table state Current available memory and usage history chart Status of web sites and application pools in Internet Information Server SolarWinds Kiwi CatTools(A must have for all small or low-budget companies) This tool comes from the leading network management and analysis company, “SolarWinds”; Kiwi CatTools supports automatic backup and update activities for multivendor network devices. such as Nortel routers, Cisco switches, and ASA firewalls with central
  • 3. GUI-based network management. While resolving a network issue, you can compare past and present configurations to find the changes quickly. Kiwi CatTools can be installed on Microsoft Servers or desktop Windows platforms so that you can manage your network’s configurations from your computer as well. References Wang, L., Yu, J., Qiao, B., Lima, S., & Rocha, Á. (2018). Intelligent evaluation of computer network security based on neural network. Journal of Intelligent & Fuzzy Systems, 35(3), 2887–2891. https://doi.org/10.3233/JIFS-169643 Diekmann, C., Naab, J.Agile Network Access Control in the Container Age. (2019). IEEE Transactions on Network and Service Management, Network and Service Management, IEEE Transactions on, IEEE Trans. Netw. Serv. Manage, (1), 41. https://doi.org/10.1109/TNSM.2018.2889009 FEDERAL BUILDING SECURITY: Actions Needed to Help Achieve Vision for Secure, Interoperable Physical Access Control. (2018). GAO Reports, 188. Retrieved from http://search.ebscohost.com/login.aspx?direct=tr ue&AuthType= shib&db=f5h&AN=133672481&site=eds-live