SlideShare a Scribd company logo
Telecommunications Working from home Security and remote
working can be a headache for digital nomads, and their clients
or employers. If you’re a remote worker and have multiple
clients, sometimes in different locations around the world, you
may need to use different security applications for each of them.
You will probably have to comply with multiple policies and
regulations and may feel anxious about accessing and
inadvertently compromising a client’s network. And, on the
other hand, it is understandable if you are wary of giving up
some of your own privacy to your employer (wang, qiao & lima,
2018) . It’s not just remote workers themselves who are at risk.
Permanent employees who occasionally do work at home can
face (and cause) security issues when remotely interfacing with
an organization’s network. Let’s say we have a situation where
our organization has 20 sales representatives working outside
organization remotely. Case: Letter to CEO If we like to have
remote team in our organization first we need to convince every
one because there are several risks involved first we need to
point the risk then has to come up with possible solutions Here
in the letter we start with identification of risk. Here are some
of the risks faced by the organizatio n. Connection quality. If
the user has a poor internet connection or a weak Wi-Fi signal,
both of which are common at hotels or public hotspots for
example, then the remote desktop connection will also be slow.
Accessing applications or files becomes cumbersome. VPNs.
VPNs, or virtual private networks, are very sensitive. Many
public internet connections will not allow users to work at all,
making remote connection almost impossible. Performance.
There are many low-cost methods available, such as LogMeIn
and GoToMyPC that simply do not have the speed necessary for
accomplishing hours of work. The delays inherent in these
solutions mean they are only viable options for quick tasks or
small amounts of work. In addition, they may not allow for
local file and printer access(Diekmann & Naab, 2019).
Security. Public hotspots are common at coffee shops, airports,
hotels, and even public parks. While they are convenient, they
are also highly susceptible to hackers who would be able to
access any of the data you’re working on while using the shared
Wi-Fi. Application availability. Systems like Citrix and
Terminal Server only allow access to certain programs that have
been configured by the IT administrator. Often times, users
need access to applications they installed themselves, special
plugins, configurations, or files from their desktop, or other
resources that are not on the remote access server. What’s more,
these systems often work differently than the desktops. This
change in habitual processes is inconvenie nt and sure to slow
any user down. Open applications. If a user left files or
applications open on their business desktop, they are locked
there. It is impossible to log in to them a second time from a
remote access system. These are the issues faced due to the
remote users using tools like wire shark, Firewalls, Anti -virus,
VPN, Backup plans, role-based access etc can solve the
problems Some tools and there functionality’s Pulseway offers
you total control of your PCs, no matter where from it is or
when it is. You can monitor and manage Windows, Mac
Operating Systems, and Linux as well as any application using
the monitoring API. It dramatically reduces the level of manual
checks for support engineers and provides them with a real time
status of their monitored systems. You are the first to know
about any potential issues affecting your systems and can
resolve those issues immediately(Diekmann & Naab, 2019).
Remotely monitor and control your IT systems Current
available memory and historical graphical usage Network
interfaces and traffic table state Current available memory and
usage history chart Status of web sites and application pools in
Internet Information Server SolarWinds Kiwi CatTools(A must
have for all small or low-budget companies) This tool comes
from the leading network management and analysis company,
“SolarWinds”; Kiwi CatTools supports automatic backup and
update activities for multivendor network devices. such as
Nortel routers, Cisco switches, and ASA firewalls with central
GUI-based network management. While resolving a network
issue, you can compare past and present configurations to find
the changes quickly. Kiwi CatTools can be installed on
Microsoft Servers or desktop Windows platforms so that you
can manage your network’s configurations from your computer
as well. References Wang, L., Yu, J., Qiao, B., Lima,
S., & Rocha, Á. (2018). Intelligent evaluation of computer
network security based on neural network. Journal of Intelligent
& Fuzzy Systems, 35(3), 2887–2891.
https://doi.org/10.3233/JIFS-169643 Diekmann, C., Naab,
J.Agile Network Access Control in the Container Age. (2019).
IEEE Transactions on Network and Service Management,
Network and Service Management, IEEE Transactions on, IEEE
Trans. Netw. Serv. Manage, (1), 41.
https://doi.org/10.1109/TNSM.2018.2889009 FEDERAL
BUILDING SECURITY: Actions Needed to Help Achieve
Vision for Secure, Interoperable Physical Access Control.
(2018). GAO Reports, 188. Retrieved from
http://search.ebscohost.com/login.aspx?direct=tr ue&AuthType=
shib&db=f5h&AN=133672481&site=eds-live

More Related Content

Similar to Telecommunications Working from home  Security and remote working ca

Evolution of #cloud computing
Evolution of #cloud computingEvolution of #cloud computing
Evolution of #cloud computing
Cirro
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
arms8586
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
InfinityGroup5
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
ardexateam
 
5 benefits of network monitoring
5 benefits of network monitoring5 benefits of network monitoring
5 benefits of network monitoring
Flightcase1
 
End-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shiftEnd-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shift
Uni Systems S.M.S.A.
 
Why Should Nonprofits Care About Cloud Computing
Why Should Nonprofits Care About Cloud ComputingWhy Should Nonprofits Care About Cloud Computing
Why Should Nonprofits Care About Cloud Computing
TechSoup Global
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
rtodd599
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
jeffsrosalyn
 
LogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdf
LogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdfLogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdf
LogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdf
aradhana9856
 
How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...
How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...
How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...
Dana Gardner
 
1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdf1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdf
expressionnoveltiesk
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
infra-si
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Allwyn24
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
Array Networks
 
Up in the Clouds
Up in the CloudsUp in the Clouds
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
tcarrucan
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
Arrow ECS UK
 
cloud-computing
cloud-computingcloud-computing
cloud-computing
Suneel Dogra
 

Similar to Telecommunications Working from home  Security and remote working ca (20)

Evolution of #cloud computing
Evolution of #cloud computingEvolution of #cloud computing
Evolution of #cloud computing
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
 
5 benefits of network monitoring
5 benefits of network monitoring5 benefits of network monitoring
5 benefits of network monitoring
 
End-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shiftEnd-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shift
 
Why Should Nonprofits Care About Cloud Computing
Why Should Nonprofits Care About Cloud ComputingWhy Should Nonprofits Care About Cloud Computing
Why Should Nonprofits Care About Cloud Computing
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
LogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdf
LogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdfLogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdf
LogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdf
 
How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...
How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...
How Data-Driven Continuous Intelligence Benefits Aid the Development and Mana...
 
1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdf1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdf
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
 
Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417
 
Up in the Clouds
Up in the CloudsUp in the Clouds
Up in the Clouds
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
cloud-computing
cloud-computingcloud-computing
cloud-computing
 

More from alehosickg3

Watch the movie Dirt. Write a note. The notes do not have to be in .docx
Watch the movie Dirt. Write a note. The notes do not have to be in .docxWatch the movie Dirt. Write a note. The notes do not have to be in .docx
Watch the movie Dirt. Write a note. The notes do not have to be in .docx
alehosickg3
 
Watch the PBS video, States Grapple with Funding Education amid Bu.docx
Watch the PBS video, States Grapple with Funding Education amid Bu.docxWatch the PBS video, States Grapple with Funding Education amid Bu.docx
Watch the PBS video, States Grapple with Funding Education amid Bu.docx
alehosickg3
 
Watch the 1985 movie Fletch, starring Chevy Chase, and write.docx
Watch the 1985 movie Fletch, starring Chevy Chase, and write.docxWatch the 1985 movie Fletch, starring Chevy Chase, and write.docx
Watch the 1985 movie Fletch, starring Chevy Chase, and write.docx
alehosickg3
 
Watch the documentary and answer one or more of the following qu.docx
Watch the documentary and answer one or more of the following qu.docxWatch the documentary and answer one or more of the following qu.docx
Watch the documentary and answer one or more of the following qu.docx
alehosickg3
 
Watch one or more of the following videos discussing randomness, sta.docx
Watch one or more of the following videos discussing randomness, sta.docxWatch one or more of the following videos discussing randomness, sta.docx
Watch one or more of the following videos discussing randomness, sta.docx
alehosickg3
 
Watch one of the following moviesA Beautiful Mind (2001).docx
Watch one of the following moviesA Beautiful Mind (2001).docxWatch one of the following moviesA Beautiful Mind (2001).docx
Watch one of the following moviesA Beautiful Mind (2001).docx
alehosickg3
 
Watch BNET Videos video titled Modernizing Inventory Management o.docx
Watch BNET Videos video titled Modernizing Inventory Management o.docxWatch BNET Videos video titled Modernizing Inventory Management o.docx
Watch BNET Videos video titled Modernizing Inventory Management o.docx
alehosickg3
 
Was the Scientific Revolution intended to be a war on tradition and .docx
Was the Scientific Revolution intended to be a war on tradition and .docxWas the Scientific Revolution intended to be a war on tradition and .docx
Was the Scientific Revolution intended to be a war on tradition and .docx
alehosickg3
 
WarehousingCompanies use cross-docking to improve the performanc.docx
WarehousingCompanies use cross-docking to improve the performanc.docxWarehousingCompanies use cross-docking to improve the performanc.docx
WarehousingCompanies use cross-docking to improve the performanc.docx
alehosickg3
 
War and Peace Please respond to the followingBased on the lect.docx
War and Peace Please respond to the followingBased on the lect.docxWar and Peace Please respond to the followingBased on the lect.docx
War and Peace Please respond to the followingBased on the lect.docx
alehosickg3
 
Wang, Woo, Choon, Quek, Yang, and Liu (2012) found that using Facebo.docx
Wang, Woo, Choon, Quek, Yang, and Liu (2012) found that using Facebo.docxWang, Woo, Choon, Quek, Yang, and Liu (2012) found that using Facebo.docx
Wang, Woo, Choon, Quek, Yang, and Liu (2012) found that using Facebo.docx
alehosickg3
 
W4 Assignment DeterrenceIntroduction to CriminologyCrime and C.docx
W4 Assignment DeterrenceIntroduction to CriminologyCrime and C.docxW4 Assignment DeterrenceIntroduction to CriminologyCrime and C.docx
W4 Assignment DeterrenceIntroduction to CriminologyCrime and C.docx
alehosickg3
 
Vulnerable Population Summary and Proposed ProgramThe first of you.docx
Vulnerable Population Summary and Proposed ProgramThe first of you.docxVulnerable Population Summary and Proposed ProgramThe first of you.docx
Vulnerable Population Summary and Proposed ProgramThe first of you.docx
alehosickg3
 
Voices of DemocracyThe documents created at the inception of Ameri.docx
Voices of DemocracyThe documents created at the inception of Ameri.docxVoices of DemocracyThe documents created at the inception of Ameri.docx
Voices of DemocracyThe documents created at the inception of Ameri.docx
alehosickg3
 
Vital statistics collected by federal, state, & local governments ar.docx
Vital statistics collected by federal, state, & local governments ar.docxVital statistics collected by federal, state, & local governments ar.docx
Vital statistics collected by federal, state, & local governments ar.docx
alehosickg3
 
Visual Representation and Analysis of DataStateTotal.docx
Visual Representation and Analysis of DataStateTotal.docxVisual Representation and Analysis of DataStateTotal.docx
Visual Representation and Analysis of DataStateTotal.docx
alehosickg3
 
Vladimir Putin was recently reelected to another term as President o.docx
Vladimir Putin was recently reelected to another term as President o.docxVladimir Putin was recently reelected to another term as President o.docx
Vladimir Putin was recently reelected to another term as President o.docx
alehosickg3
 
Vissing (2011) explains culture as an organized system of living an.docx
Vissing (2011) explains culture as an organized system of living an.docxVissing (2011) explains culture as an organized system of living an.docx
Vissing (2011) explains culture as an organized system of living an.docx
alehosickg3
 
Visit the Endeavour Space Shuttle (I Already went there) at the .docx
Visit the Endeavour Space Shuttle (I Already went there) at the .docxVisit the Endeavour Space Shuttle (I Already went there) at the .docx
Visit the Endeavour Space Shuttle (I Already went there) at the .docx
alehosickg3
 
Visit the Endeavour Space Shuttle (any day) at the Science Cente.docx
Visit the Endeavour Space Shuttle (any day) at the Science Cente.docxVisit the Endeavour Space Shuttle (any day) at the Science Cente.docx
Visit the Endeavour Space Shuttle (any day) at the Science Cente.docx
alehosickg3
 

More from alehosickg3 (20)

Watch the movie Dirt. Write a note. The notes do not have to be in .docx
Watch the movie Dirt. Write a note. The notes do not have to be in .docxWatch the movie Dirt. Write a note. The notes do not have to be in .docx
Watch the movie Dirt. Write a note. The notes do not have to be in .docx
 
Watch the PBS video, States Grapple with Funding Education amid Bu.docx
Watch the PBS video, States Grapple with Funding Education amid Bu.docxWatch the PBS video, States Grapple with Funding Education amid Bu.docx
Watch the PBS video, States Grapple with Funding Education amid Bu.docx
 
Watch the 1985 movie Fletch, starring Chevy Chase, and write.docx
Watch the 1985 movie Fletch, starring Chevy Chase, and write.docxWatch the 1985 movie Fletch, starring Chevy Chase, and write.docx
Watch the 1985 movie Fletch, starring Chevy Chase, and write.docx
 
Watch the documentary and answer one or more of the following qu.docx
Watch the documentary and answer one or more of the following qu.docxWatch the documentary and answer one or more of the following qu.docx
Watch the documentary and answer one or more of the following qu.docx
 
Watch one or more of the following videos discussing randomness, sta.docx
Watch one or more of the following videos discussing randomness, sta.docxWatch one or more of the following videos discussing randomness, sta.docx
Watch one or more of the following videos discussing randomness, sta.docx
 
Watch one of the following moviesA Beautiful Mind (2001).docx
Watch one of the following moviesA Beautiful Mind (2001).docxWatch one of the following moviesA Beautiful Mind (2001).docx
Watch one of the following moviesA Beautiful Mind (2001).docx
 
Watch BNET Videos video titled Modernizing Inventory Management o.docx
Watch BNET Videos video titled Modernizing Inventory Management o.docxWatch BNET Videos video titled Modernizing Inventory Management o.docx
Watch BNET Videos video titled Modernizing Inventory Management o.docx
 
Was the Scientific Revolution intended to be a war on tradition and .docx
Was the Scientific Revolution intended to be a war on tradition and .docxWas the Scientific Revolution intended to be a war on tradition and .docx
Was the Scientific Revolution intended to be a war on tradition and .docx
 
WarehousingCompanies use cross-docking to improve the performanc.docx
WarehousingCompanies use cross-docking to improve the performanc.docxWarehousingCompanies use cross-docking to improve the performanc.docx
WarehousingCompanies use cross-docking to improve the performanc.docx
 
War and Peace Please respond to the followingBased on the lect.docx
War and Peace Please respond to the followingBased on the lect.docxWar and Peace Please respond to the followingBased on the lect.docx
War and Peace Please respond to the followingBased on the lect.docx
 
Wang, Woo, Choon, Quek, Yang, and Liu (2012) found that using Facebo.docx
Wang, Woo, Choon, Quek, Yang, and Liu (2012) found that using Facebo.docxWang, Woo, Choon, Quek, Yang, and Liu (2012) found that using Facebo.docx
Wang, Woo, Choon, Quek, Yang, and Liu (2012) found that using Facebo.docx
 
W4 Assignment DeterrenceIntroduction to CriminologyCrime and C.docx
W4 Assignment DeterrenceIntroduction to CriminologyCrime and C.docxW4 Assignment DeterrenceIntroduction to CriminologyCrime and C.docx
W4 Assignment DeterrenceIntroduction to CriminologyCrime and C.docx
 
Vulnerable Population Summary and Proposed ProgramThe first of you.docx
Vulnerable Population Summary and Proposed ProgramThe first of you.docxVulnerable Population Summary and Proposed ProgramThe first of you.docx
Vulnerable Population Summary and Proposed ProgramThe first of you.docx
 
Voices of DemocracyThe documents created at the inception of Ameri.docx
Voices of DemocracyThe documents created at the inception of Ameri.docxVoices of DemocracyThe documents created at the inception of Ameri.docx
Voices of DemocracyThe documents created at the inception of Ameri.docx
 
Vital statistics collected by federal, state, & local governments ar.docx
Vital statistics collected by federal, state, & local governments ar.docxVital statistics collected by federal, state, & local governments ar.docx
Vital statistics collected by federal, state, & local governments ar.docx
 
Visual Representation and Analysis of DataStateTotal.docx
Visual Representation and Analysis of DataStateTotal.docxVisual Representation and Analysis of DataStateTotal.docx
Visual Representation and Analysis of DataStateTotal.docx
 
Vladimir Putin was recently reelected to another term as President o.docx
Vladimir Putin was recently reelected to another term as President o.docxVladimir Putin was recently reelected to another term as President o.docx
Vladimir Putin was recently reelected to another term as President o.docx
 
Vissing (2011) explains culture as an organized system of living an.docx
Vissing (2011) explains culture as an organized system of living an.docxVissing (2011) explains culture as an organized system of living an.docx
Vissing (2011) explains culture as an organized system of living an.docx
 
Visit the Endeavour Space Shuttle (I Already went there) at the .docx
Visit the Endeavour Space Shuttle (I Already went there) at the .docxVisit the Endeavour Space Shuttle (I Already went there) at the .docx
Visit the Endeavour Space Shuttle (I Already went there) at the .docx
 
Visit the Endeavour Space Shuttle (any day) at the Science Cente.docx
Visit the Endeavour Space Shuttle (any day) at the Science Cente.docxVisit the Endeavour Space Shuttle (any day) at the Science Cente.docx
Visit the Endeavour Space Shuttle (any day) at the Science Cente.docx
 

Recently uploaded

Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 

Recently uploaded (20)

Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 

Telecommunications Working from home  Security and remote working ca

  • 1. Telecommunications Working from home Security and remote working can be a headache for digital nomads, and their clients or employers. If you’re a remote worker and have multiple clients, sometimes in different locations around the world, you may need to use different security applications for each of them. You will probably have to comply with multiple policies and regulations and may feel anxious about accessing and inadvertently compromising a client’s network. And, on the other hand, it is understandable if you are wary of giving up some of your own privacy to your employer (wang, qiao & lima, 2018) . It’s not just remote workers themselves who are at risk. Permanent employees who occasionally do work at home can face (and cause) security issues when remotely interfacing with an organization’s network. Let’s say we have a situation where our organization has 20 sales representatives working outside organization remotely. Case: Letter to CEO If we like to have remote team in our organization first we need to convince every one because there are several risks involved first we need to point the risk then has to come up with possible solutions Here in the letter we start with identification of risk. Here are some of the risks faced by the organizatio n. Connection quality. If the user has a poor internet connection or a weak Wi-Fi signal, both of which are common at hotels or public hotspots for example, then the remote desktop connection will also be slow. Accessing applications or files becomes cumbersome. VPNs. VPNs, or virtual private networks, are very sensitive. Many public internet connections will not allow users to work at all, making remote connection almost impossible. Performance. There are many low-cost methods available, such as LogMeIn and GoToMyPC that simply do not have the speed necessary for accomplishing hours of work. The delays inherent in these solutions mean they are only viable options for quick tasks or small amounts of work. In addition, they may not allow for local file and printer access(Diekmann & Naab, 2019). Security. Public hotspots are common at coffee shops, airports,
  • 2. hotels, and even public parks. While they are convenient, they are also highly susceptible to hackers who would be able to access any of the data you’re working on while using the shared Wi-Fi. Application availability. Systems like Citrix and Terminal Server only allow access to certain programs that have been configured by the IT administrator. Often times, users need access to applications they installed themselves, special plugins, configurations, or files from their desktop, or other resources that are not on the remote access server. What’s more, these systems often work differently than the desktops. This change in habitual processes is inconvenie nt and sure to slow any user down. Open applications. If a user left files or applications open on their business desktop, they are locked there. It is impossible to log in to them a second time from a remote access system. These are the issues faced due to the remote users using tools like wire shark, Firewalls, Anti -virus, VPN, Backup plans, role-based access etc can solve the problems Some tools and there functionality’s Pulseway offers you total control of your PCs, no matter where from it is or when it is. You can monitor and manage Windows, Mac Operating Systems, and Linux as well as any application using the monitoring API. It dramatically reduces the level of manual checks for support engineers and provides them with a real time status of their monitored systems. You are the first to know about any potential issues affecting your systems and can resolve those issues immediately(Diekmann & Naab, 2019). Remotely monitor and control your IT systems Current available memory and historical graphical usage Network interfaces and traffic table state Current available memory and usage history chart Status of web sites and application pools in Internet Information Server SolarWinds Kiwi CatTools(A must have for all small or low-budget companies) This tool comes from the leading network management and analysis company, “SolarWinds”; Kiwi CatTools supports automatic backup and update activities for multivendor network devices. such as Nortel routers, Cisco switches, and ASA firewalls with central
  • 3. GUI-based network management. While resolving a network issue, you can compare past and present configurations to find the changes quickly. Kiwi CatTools can be installed on Microsoft Servers or desktop Windows platforms so that you can manage your network’s configurations from your computer as well. References Wang, L., Yu, J., Qiao, B., Lima, S., & Rocha, Á. (2018). Intelligent evaluation of computer network security based on neural network. Journal of Intelligent & Fuzzy Systems, 35(3), 2887–2891. https://doi.org/10.3233/JIFS-169643 Diekmann, C., Naab, J.Agile Network Access Control in the Container Age. (2019). IEEE Transactions on Network and Service Management, Network and Service Management, IEEE Transactions on, IEEE Trans. Netw. Serv. Manage, (1), 41. https://doi.org/10.1109/TNSM.2018.2889009 FEDERAL BUILDING SECURITY: Actions Needed to Help Achieve Vision for Secure, Interoperable Physical Access Control. (2018). GAO Reports, 188. Retrieved from http://search.ebscohost.com/login.aspx?direct=tr ue&AuthType= shib&db=f5h&AN=133672481&site=eds-live