The naked laptop

Information outside the company walls still needs protection

Tim Dickinson - Kaseya Australia and New Zealand

Tim Dickinson - Kaseya Australia and New Zealand

Naked home workers may be the stuff of fantasy, but flexible working is now a corporate reality. Ready availability of broadband combined with the reliability and speed of wireless communications has transformed home and remote working.

However, flexible working is also proving to be a major business risk. Organizations struggle to impose adequate data storage, backup and security policies for remote workers. With increasing volumes of valuable data at risk through storage on laptops and home PCs, the flexible working nirvana is losing its shine. It’s the home worker’s laptop, which is rarely backed up and secured, that is truly naked.

Home Working Revolution
Organizations are increasingly creating flexible contracts for workers, allowing home working one or two days per week. Customer facing employees are now in constant communication with head office irrespective of location. In an environment promoting improved work and lifestyle balance, the flexibility offered by reliable remote working is transforming the workplace. No longer chained to the desk, home workers are free to choose the attire, location and time for work – giving rise to the notion of the naked home worker!

While offering many clear benefits, ad hoc policies for remote working also create significant corporate risks. After years of investment in data backup and security, organizations are now victim to vital company data leaving the organization unsecured, unprotected and not backed up.

Exposed
More often than not organizations are delivering laptops and VPN access with no more than generic LAN-based policies for regular backups, security and data synchronization. The result is intermittent local backups at best, a tendency to override data synchronization with the corporate network to save time and sporadic virus/security checks.

As a result, vital corporate information is being left exposed. It is often only shared with other workers via e-mail, undermining management policies and challenging expensive compliance strategies.

More critically, however, any damage or theft of these remote devices will result in employee downtime and complete data loss while vital documents and information – from new business propositions to customer correspondence – may be lost for good.

Uncovered
So how can organizations protect the growing volume of data now located outside the safe confines of the corporate IT infrastructure? Larger organizations with deep pockets are imposing complete control by combining VPN access with automatic security updates, backup and synchronization whenever a remote machine logs onto the corporate network. Further safeguards are imposed with often severely restricted access to corporate applications when outside the network.

However, even tightly defined policies can cause problems. By only allowing restricted access to corporate applications and significantly reducing the facilities available on portable devices, organizations are running into problems with knowledge workers who are simply not able to work effectively.

In addition, synchronization and updated backups/security upgrades are only conducted when the user is connected to the corporate network because the majority of tools automating these processes are LAN-based.

The only way organizations can truly impose control over the remote workforce and protect data outside the corporate network is to adopt Web-based technology that provides monitoring and support irrespective of location across every wired and wireless Internet connection.

Centralized Control
By extending Internet-based monitoring and support of devices from within the IT infrastructure to every remote device organizations can regain control over their flexible workers. Combining real-time security downloads with automated backups transforms the safety and reliability of the remote working model. Indeed, even if an organization opts not to enforce automation, real-time monitoring ensures visibility whether or not employees are following backup and security procedures remotely.

Using such a model data can either be streamed to an off-site repository, or backed up onto a local device controlled remotely from within the corporate business, while security scans and updates can be scheduled and enforced should a machine be off line at the scheduled time. Snapshots of the entire machine taken at regular intervals ensure that should failure occur, the device can be remotely rebuilt and reinstalled within minutes, transforming productivity.

Flexible Risk
With ever growing demand for flexible working policies that embrace home working, hot-desking and the use of satellite offices, the pyjama wearing employee is a growing breed. But if they are to continue to deliver corporate value, organizations have got to recognize the dangers posed by unsecured data and unprotected machines.

Today, too many in-house and outsourced IT teams are veering from imposing excessive controls that constrain productivity to no control, leading to remote data anarchy. Unless this risk is addressed, organizations will begin to rapidly rethink the value of remote working. It is only by leveraging Web-based tools that organizations can achieve the remote monitoring and automated backup and security required to cost effectively bring the remote workforce back into the controlled environment of the corporate infrastructure.

Tim Dickinson is regional manager for Australia and New Zealand at IT automation software vendor Kaseya.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Tim Dickinson

Techworld Australia
Show Comments

Cool Tech

Toys for Boys

Family Friendly

Stocking Stuffer

SmartLens - Clip on Phone Camera Lens Set of 3

Learn more >

Christmas Gift Guide

Click for more ›

Brand Post

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Aysha Strobbe

Microsoft Office 365/HP Spectre x360

Microsoft Office continues to make a student’s life that little bit easier by offering reliable, easy to use, time-saving functionality, while continuing to develop new features that further enhance what is already a formidable collection of applications

Michael Hargreaves

Microsoft Office 365/Dell XPS 15 2-in-1

I’d recommend a Dell XPS 15 2-in-1 and the new Windows 10 to anyone who needs to get serious work done (before you kick back on your couch with your favourite Netflix show.)

Maryellen Rose George

Brother PT-P750W

It’s useful for office tasks as well as pragmatic labelling of equipment and storage – just don’t get too excited and label everything in sight!

Cathy Giles

Brother MFC-L8900CDW

The Brother MFC-L8900CDW is an absolute stand out. I struggle to fault it.

Luke Hill

MSI GT75 TITAN

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?