Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Operation Workacation: How To Securely Work From the Beach

The weather is heating up and vacation season is starting! Do you look forward to this time of year but are afraid of trying to keep up with things at the office, responding to customers, and managing your staff while you’re traveling with your family? As this webinar will prove, you can continue to be productive while still enjoying summer travel. Today’s technology options can help free you from the office while letting you stay in touch and in control.
You will learn:
Remote workforce market trends
Tips on staying productive during the vacation season
Common methods of staying connected
New technologies to explore
Eliminating possible security issues
Discover the ways in which you can bridge the gap between your work world and Disney World.

  • Be the first to comment

  • Be the first to like this

Operation Workacation: How To Securely Work From the Beach

  1. 1. Delivering IT Peace of MindSM OPERATION WORKATION How to securely work from the beach
  2. 2. Delivering IT Peace of MindSM Work Life Balance So we have been told….. At one point in history, people went to work and when they came home they didn’t check email, text messages, Twitter, Facebook or anything else. Work stayed at work.
  3. 3. Delivering IT Peace of MindSM Work Life Balance In Simpler Times Work Life So we have been told….. At one point in history, people went to work and when they came home they didn’t check email, text messages, Twitter, Facebook or anything else. Work stayed at work.
  4. 4. Delivering IT Peace of MindSM Work Life Balance The reality for many of us these days is that our professional lives bleed into our personal lives! In our time
  5. 5. Delivering IT Peace of MindSM In our time Work Life Balance LifeWork The reality for many of us these days is that our professional lives bleed into our personal lives!
  6. 6. Delivering IT Peace of MindSM With constant connection to work it is no wonder that we need a vacation.
  7. 7. Delivering IT Peace of MindSM 85% of Americans (198 million people) are planning time away in the coming months, up 13% from 2014. We Need a Vacation http://about.americanexpress.com/news/pr/2015/summer-travelers-extend-vacations.aspx/
  8. 8. Delivering IT Peace of MindSM …but not all of us feel comfortable just dropping everything and completely unplugging. We Need a Vacation
  9. 9. Delivering IT Peace of MindSM 42% of Americans had unused vacation time; totaling 429 million unused days and an average of 3.2 days per person We Need a Vacation http://www.projecttimeoff.com/resources/executive-summary/assessment-paid-time-us-executive-summary
  10. 10. Delivering IT Peace of MindSM 9% were afraid to take time off due to unstable job market. We Need a Vacation http://money.cnn.com/2012/05/18/news/economy/unused_vacation_days/index.htm
  11. 11. Delivering IT Peace of MindSM 12% reported feeling guilty that they’re not at work. We Need a Vacation http://money.cnn.com/2012/05/18/news/economy/unused_vacation_days/index.htm
  12. 12. Delivering IT Peace of MindSM Considering the way work 24/7 while we are NOT on vacation, and the current job market, it is really unrealistic to think we are just going to unplug. Most people work while on vacation. We Need a Vacation
  13. 13. Delivering IT Peace of MindSM Question How do you plan to work on your summer vacation? a) I don’t, I plan to unplug and leave work behind. b) I plan to check and respond to email, voicemail or texts during some part of my trip. c) I expect my boss to call and ask me to do some work. d) I will review some documents while on vacation. e) I am not taking a vacation this summer .
  14. 14. Delivering IT Peace of MindSM How the Nation Workations 0% 10% 20% 30% 40% 50% 60% Work While on Vacation Read Emails Access Documents Texting Asked To Do Work By the Boss http://www.teamviewer.com/en/press/20120717.aspx
  15. 15. Delivering IT Peace of MindSM Methods of Access People use a variety of devices and methods to connect while on vacation. The problem is a lot of these methods are not really safe and put corporate data at risk of being stolen or compromised.
  16. 16. Delivering IT Peace of MindSM Methods of Access •Reading Email – Smart phone, IPAD or Tablet – Personal computer • Using a public WiFi network – Public or semi-public computer •Accessing Documents – Corporate VPN – Dropbox – Backdoor program like LogMeIn – Email yourself files ahead of time
  17. 17. Delivering IT Peace of MindSM Bringing Your Own Device • Lost/Stolen/Damaged http://www.ponemon.org/local/upload/file/The_Human_Factor_in_data_Protection_WP_FINAL.pdf http://www.computerworld.com/s/article/9105198/Survey_More_than_10_000_laptops_lost_each_week_at_airports 12,000 computers are lost at airports every week. 56% of people say their laptop frequently contains confidential information. 65% do not take extra precautions to protect their information.
  18. 18. Delivering IT Peace of MindSM Bringing Your Own Device • Best Practices Before You Travel – Have a mobile device management policy for your company. • Password enforcement not enough. • Must use encryption. • Must be able to remotely wipe the device. • Should prevent access via open Wi-Fi networks. • Use a technology to enforce the policy. • Best Practices While You’re Traveling – Treat your devices like cash and keep a close eye on them.
  19. 19. Delivering IT Peace of MindSM Lost Laptop Case Study • Small Hospice in Idaho – Laptop was stolen out of a car and contained about 500 unencrypted patient records. – This was the first data breach for this company. *Network World, 2013: http://www.networkworld.com/community/blog/first-time-small-data-breach-draws-big-fine-50k
  20. 20. Delivering IT Peace of MindSM Lost Laptop Case Study • Small Hospice in Idaho – Laptop was stolen out of a car and contained about 500 unencrypted patient records. – This was the first data breach for this company. *Network World, 2013: http://www.networkworld.com/community/blog/first-time-small-data-breach-draws-big-fine-50k Fined $50,000 for losing a single laptop
  21. 21. Delivering IT Peace of MindSM Lost Laptop Case Study • Massachusetts Eye and Ear Hospital – Laptop was stolen out of a car and contained 3,500 unencrypted patient records.
  22. 22. Delivering IT Peace of MindSM Lost Laptop Case Study • Massachusetts Eye and Ear Hospital – Laptop was stolen out of a car and contained 3,500 unencrypted patient records. Fined $1.5m for losing a single laptop
  23. 23. Delivering IT Peace of MindSM Lost Laptop Case Study • NASA – Lost a laptop with a “significant number” of employee’s personal information. – Stolen out of a locked car – The computer was password protected
  24. 24. Delivering IT Peace of MindSM Lost Laptop Case Study • NASA – Lost a laptop with a “significant number” of employee’s personal information. – Stolen out of a locked car. – The computer was password protected. Over $200,000 in credit monitoring services for those affected.
  25. 25. Delivering IT Peace of MindSM Unsecured Networks • Any network that does not require a password should be considered unsecure and unsafe. • Tips for secure browsing on public WiFi: – Use a VPN • If your company does not have one and you travel a lot consider buying a subscription to a VPN service. – Only accesses sites with HTTPS. – Save your online banking for when you are at home. – Airplane mode is your friend.
  26. 26. Delivering IT Peace of MindSM NEW SOLUTIONS TO WORK WHILE ON THE ROAD 26
  27. 27. Delivering IT Peace of MindSM New Technology Solutions for the Enterprise • Virtual Desktops – A cloud based desktop you can log into from anywhere. • Mobile Device Management – Gives employers control over employee owned devices that may be accessing corporate data.
  28. 28. Delivering IT Peace of MindSM What is a Virtual Desktop? • The desktop environment, all the data and the computer computation take place on a server in our data center. • The end users access their desktop over the internet using an endpoint device, a laptop, tablet computer or thin client. – No computation is performed on the endpoint device. – No data is stored on the endpoint device. – Only screen images and input commands like mouse clicks and keyboard commands are sent across the datacenter.
  29. 29. Delivering IT Peace of MindSM Virtual Desktop Advantages 29 Quickly and easily add desktops and resources for growth. SCALABLE Companies can get off the desktop refresh treadmill. Lifespan of existing desktops can be extended. BUDGETING Your data never leaves your data center. A lost laptop does not mean lost data. SECURITY Work on any device from anywhere. PORTABILITY
  30. 30. Delivering IT Peace of MindSM Mobile Device Management (MDM) • MDM provides a comprehensive and complete set of capabilities to get both corporate and employee owned devices enrolled and configured over the air for enterprise access to secure corporate data stored on these devices. • Customers receive the entire mobile device lifecycle. – Specifying and enabling global policies. – Over the Air (OTA) enrollment of mobile devices. – Providing device compliance and inventory data. – Remote lock or remote wipe of all data or corporate data from managed devices. – End-user help desk support.
  31. 31. Delivering IT Peace of MindSM 31 July 22, 2015 MDM Benefits at a Glance • Secure – Manages native security settings – Enforces device compliance – Extends corporate security infrastructure to mobile devices – Retains users personal profile while meeting corporate security objectives • Easy – User provisioning • Scalable – The service grows with the needs of your business
  32. 32. Delivering IT Peace of MindSM Additional Options and Tips • Encrypted Thumb Drive – Add documents and contacts you know you will need. – Make sure this is encrypted!!! • Tether your laptop from your smart phone – Some wireless providers allow you to make a secure wireless network. • Use a VPN tunnel – Creates a secure link between you and your office. • Use an Enterprise File Sync program – Dropbox is for individual use, no audit trail of file access. – Products like Box.net and FileSync have controls and audit logs so file sharing can be controlled and monitored. 32
  33. 33. Delivering IT Peace of MindSM mindSHIFT Technologies • cloudSHIFT℠ Desktop – A fully managed hosted virtual desktop • mindSHIFT Hosted Email – A fully managed email solutions built with security first: • Integrated Mobile Device Management • Encrypted Email • Total IT Management – Several Managed IT services plans • We manage your entire IT stack – VPN Capabilities – Desktop Encryption – Professional Services to help you craft a Mobile Device policy 33
  34. 34. Delivering IT Peace of MindSM Bon Voyage •Always keep a close eye on devices •Encrypt your laptop and USB drives •Implement a mobile device management policy at your workplace •Never use the “Free Wireless”
  35. 35. Delivering IT Peace of MindSM Thank You Find Us Click Here For More Information Please contact us with questions at: info@mindSHIFT.com www.mindSHIFT.com 877-227-5054

×