Remote Support Tools - not without Complications
by Kirsten Dunlaevy
January 3, 2014
As employees acquire more and more remote devices, such as laptops, tablets and mobile phones, it becomes increasingly more difficult for companies to protect the devices and the valuable data stored within each one. A recent study showed that companies are often still unprepared when it comes to security breaches and providing their employees with remote support technology.
Remote Support’s biggest vulnerability - Browsers
Remote support is typically run through web browsers, primarily due to ease of use – not only is it easy to install, but it’s also easy to use across a variety of devices. Unfortunately, the fact that it is browser based is also one of its biggest vulnerabilities. Any regular safety issues you might experience with a browser become a risk with remote support run through a browser. Things as simple as not logging out properly can give a cyber-criminal complete access to you and your company’s network.
How to safely use a remote support tool?
So how does one enjoy the good things about a remote support tool, without the risks of operating off of a browser? We’d recommend using an IPsec VPN gateway with a remote desktop component. By utilizing this method, companies can direct staff access via a highly secure and encrypted tunnel. There is also the added benefit that any and all communications between employees are also protected.