Some Things to Think About For Work From Home Scenarios

Nowadays, more and more business users work from home than ever. You save time by not having to commute that far from your home to the office and use that commute time to being more efficient by getting more things done at the office and/or spend more quality time with your family, spend more time take care of yourself to become healthier by going to the gym, or even put more time into work because you now have more time to do so.

There are some things that businesses must keep in mind when allowing their employees to work from home, and one of them is IT Security. Businesses have to make sure that the employees are communicating securely to the corporate office when they are working remotely (either from the employee’s home or from a coffee shop somewhere). One of the very first suggestions is to make sure that business users are connecting with a virtual provide network tunnel to the corporate office. This creates a virtual and encrypted tunnel from their remote home office or from any other remote location. After that, all communicates to the corporate office is encrypted and transferred securely through the tunnel. Corporate users can decide whether they want to allow split tunneling or not.

Split tunneling is a feature on the virtual private network (VPN) tunnel and a business decision to send all traffic (including the internet’s traffic) through the tunnel to the corporate office. This way, the users’ laptop is protected from accessing any insecure and unsafe internet site. The corporate may also have a way to monitor and protect that VPN tunnel’s traffic so that any if there is any viruses or malwares are detected, it will have a way to stop that from infecting the whole network. There is a downside to this however. The downside is that there will be a lot more traffic going through the corporate’s network. So, the company has to decide what is best in terms of priority.

If businesses decide to allow split tunneling for remote users working from home, it should make sure that the users’ laptop has some security application installed such as firewall, ant-virus and anti-malware application enabled to detect and block, drop or prevent malicious traffic from entering and infecting others. Several solutions exist for this and one method is to use the Cisco AMP for Endpoints.

Today’s corporate end gateway firewalls are a lot more sophisticated that they do some detection and policy checks when users connect to the office to make sure that the laptops have all the security features enabled and if not, the users’ laptop is prompted to install anything that the laptop needs to comply with the corporate security policy and standard. That way, there is no need to worry that the network is unprotected and insecure.

12 Comments

  1. You tend to make a lot of good opinions here which have me personally pondering. I personally accept most of your views. This specific is really a well-written write-up with tons of fascinating details. Incredibly fine job.

  2. Thank you so much for composing as well as discussing this informative article. You’re obviously extremely knowledgeable in this area and I have discovered this particular to be intriguing and sensible reading. Decent job.

  3. I really like looking at info which makes my brain operate and you also really have my own gears turning. Many thanks for these details. You actually have got a skill for putting things into words and phrases and making it easy to understand.

  4. I am in total agreement with lots of information in this post. You are an original writer with the capability to place your opinions into crystal clear words and phrases. Any person must be able to appreciate this.

  5. I actually plan to come back to your own write-up afterwards to go through it once again and think about the points you make within it. It is currently inside my favorite’s folder. Thank you very much.

  6. Thank you for providing this type of top quality material. I’m extremely pleased regarding the way you are able to create your content in such a fascinating manner.

  7. Sensational content! I personally appreciate your work and the energy you placed into your exploration as well as writing. I stand in agreement on nearly every viewpoint.

  8. I’ve bookmarked this informative article so I could come back later and read it once again. It is remarkably exciting, very well researched and composed. I hardly ever notice remarkable material nowadays. Thanks a lot.

  9. You really understand how to convey your ideas in the written planet. This article is actually spot on accurate in my opinion. I agree with your opinions. I hope lots of readers view this specific material.

  10. There is a lot of perfect information in this post which I must discuss it with my hubby later. I have saved it to show him.

  11. I like the way you portrayed your points in this post. I am in complete agreement on several points and am intending on taking stock in others. Thanks for writing this sort of interesting content on this specific topic.

  12. I had been very amazed when I found this article. Thank you for this informative content and sharing your perspectives. It is wonderful quality job.

Comments are closed.