Story image

The naked laptop

01 Sep 08

Naked home workers may be the stuff of fantasy, but flexible working is now a corporate reality improving staff retention and supporting corporate environmental policies. The near ubiquity of broadband, combined with a transformation in the reliability and speed of wireless communications, has completely altered the viability of home and remote working.

However, flexible working is also proving to be a major business risk as organisations struggle to impose adequate data storage, backup and security policies for remote workers.  With increasing volumes of valuable data stored on laptops, home PCs in danger of being lost to the business, and employees being left unproductive with lost or damaged equipment, the flexible working nirvana is losing its shine. It’s the home worker’s laptop, which is rarely backed up and secured, that is truly naked.

Home working revolution

Organisations are increasingly creating flexible contracts for workers, allowing home working one or two days each week, whilst customer-facing employees are now able to be in constant communication with head office irrespective of global location. In an environment of over crowded trains and roads, the flexibility offered by reliable remote working is delivering improved staff morale, driving down employee churn and transforming opportunities for organisations to entice part time staff back into the workplace.

This burgeoning generation of mobile workers has spawned a new era of working practices. No longer chained to the desk, home workers are released to adopt any style of attire, location and time for work – giving rise to the notion of the naked home worker!

Yet while offering many clear benefits, ad hoc policies for home or remote working also create significant corporate risks, risks that extend far beyond generally unfounded fears for employee productivity. Critically, after years of investment in data backup and security within the corporate IT infrastructure, organisations are apparently allowing vital company data to leave the organisation unsecured, unprotected and un-backed up in what is becoming an anarchic remote working environment.


Indeed, more often than not organisations are delivering laptops and VPN access with no more than generic LAN-based policies for regular backups, security downloads and data synchronisation. They have no visibility of whether or not these activities are carried out and no way of imposing control.

The result is intermittent local backups at best, a tendency to override data synchronisation with the corporate network to save time, and sporadic virus and security checks. Users also often forget to turn off other systems before using the VPN, leading to back-door access to corporate LAN, adding significant security risks to the organisation.

In far too many cases, vital corporate information is being left unsecured, unstored and unprotected on remote machines. It is often only shared with other workers via email, undermining corporate document management policies and challenging expensive compliance strategies.

More critically, however, any damage or theft of these remote devices will result in complete data loss – at potentially huge operational cost.  Also, the remote worker will be left without workable equipment for some time. Waiting for a member of the IT support team to come and repair, replace or reinstall the machine can take several unproductive days, whilst the vital documents and information – from new business propositions to customer correspondence – have been lost for good.


So how can organisations or you, their IT service providers, protect the growing volume of data now located outside the safe confines of the corporate IT infrastructure? Larger organisations with deep pockets are imposing complete control by combining VPN access with automatic security updates, backup and synchronisation whenever the remote machine logs onto the corporate network.  And access to corporate applications when outside the network is often severely restricted to further safeguard the infrastructure.

However, even such tightly defined policies can cause problems. By only allowing heavily restricted access to corporate applications and significantly reducing the facilities available on portable devices, organisations are running into problems with senior knowledge workers who are simply not able to work effectively. The result is a gradual policy creep, with IT changing access rules and machine functionality on a case by case basis, undermining the corporate policy and adding risk in the process.

In addition, synchronisation and updated backups and security upgrades are only conducted when the user is connected to the corporate network because the majority of tools automating these processes are LAN based.  The result is that remote workers are left unprotected when working on their standard internet connections.

The only way organisations can truly impose control over the remote workforce and protect data outside the corporate network is to adopt web-based technology that provides monitoring and support irrespective of location across every wired and wireless internet connection.

Centralised control

It is by extending internet-based monitoring and support of devices from within the IT infrastructure to every remote device that organisations can regain control over the growing band of flexible workers. Combining real time security downloads with automated backups transforms the safety and reliability of the remote working model. Indeed, even if an organisation opts not to enforce automation, real time monitoring ensures visibility of whether or not employees are following backup and security procedures remotely.

Using such a model, data can either be streamed to an off-site repository or backed up onto a local device controlled remotely from within the corporate business, whilst security scans and updates can be scheduled and enforced should a machine be off line at the scheduled time.  Furthermore, snapshots of the entire machine taken at regular intervals ensure that should failure occur, the device can be remotely rebuilt and reinstalled within minutes, transforming productivity.

Should a user require additional functionality to support specific job requirements, this can be achieved within seconds and with full visibility of the security policy, minimising any potential reduction in productivity.

In addition, real time monitoring provides immediate insight into inappropriate remote behaviour, such as the installation of new software or hardware devices. Critically, the organisation can monitor these remote machines using the same tools and console already being used to manage the existing internal infrastructure, minimising the cost of enabling a remote workforce.

Flexible risk

With ever growing demand for flexible working policies that embrace home working, hot-desking and the use of satellite offices, the pyjama wearing employee is a growing breed. But if they are to continue to deliver corporate value, organisations have got to recognise the dangers posed by unsecured data and unprotected machines.

Today, too many in-house and outsourced IT teams are veering from imposing excessive control that constrains productivity to no control, leading to remote data anarchy. Unless this risk is addressed, organisations will begin to rapidly rethink the value of remote working, undermining both human resources and environmental policies. It is only by leveraging web-based tools that organisations can achieve the remote monitoring and automated backup and security required to cost effectively bring the remote workforce back into the controlled environment of the corporate infrastructure.   

Survey reveals CX disconnect is risky business
Too much conversation and too little action could lead companies to neglect, lose, and repel their very lifeblood, according to Dimension Data.
Eaton launches portal and revamped partner programme
The portal has many features including a training academy, monthly promotions, rewards and a 24-hour turnaround on deal registrations.
8x8 appoints A/NZ channel senior manager
Joins 8x8 after time at Oracle, Avaya and Optus to managing 8x8’s growing team of partners across the region.
Interview: Chillisoft and LogRhythm ready for the NZ channel
ChannelLife talks with Chillisoft CEO Alex Teh and LogRhythm A/NZ sales director Simon Howe about their plans for Kiwi cybersecurity partners.
Check Point launches hyperscale network security solution
With Check Point Maestro, organisations can scale up their existing Check Point security gateways on demand.
Trend Micro’s telecom security solution certified as VMware-ready
Certification by VMware allows communications service providers who prefer or have already adopted VMware vCloud NFV to add network security services from Trend Micro.
Logitech wins awards for the art of good design
What makes a good design? Logitech may know a thing or two about that.
Chillisoft nabs LogRhythm as next major vendor
Chillisoft signs on the global SIEM provider as it continues to expand its solution portfolio for the growing cybersecurity market.