In large companies, the IT department usually handles the tasks of installing and configuring business software for every one of its computers. For a small team, however, having even one dedicated specialist may prove to be an unjustified luxury. Most SMB companies have to make do with a revolving cast of part-time system administrators (sysadmins), who are not always available. So in some cases employees have to set up their own workplace software.

 

But not everybody knows how to set up a complex solution, even with a manual. If something goes wrong, if the admin is unreachable or missing, and nobody in the office is familiar with the problem, some employees may have the bright idea of calling in someone they know who’s good with computers.

Some companies without dedicated support staff actually consider that sort of thing normal — employees just pay for the services and get reimbursed later. Normal or not, such cases tend to involve granting remote access to the contractor, and that is a clear cause for concern.

Real threats of remote access

To begin with, you haven’t the faintest idea of just how qualified this IT contractor or handy friend-of-a-friend-of-an-employee is, how seriously they take their own security much less yours, and how reliable they are. By allowing your employees to invite random help — and delegate control of their computers — you put your entire corporate network at risk.

 

The remote sysadmin may accidentally come across your business correspondence, contract drafts, or other confidential documents. Their own computer may be compromised. You never know how they go about keeping credentials to your computer safe and who else might have access to it. And if their integrity is less than stellar, they could copy your important data or infect your system on purpose.

 

In search of a solution, your employee may also hit a false tech support website. These are very actively advertised on social media and themed forums.

 

As a result, your business may suffer serious financial and reputational losses. Data theft or damage alone is likely to cost you a pretty penny. Then, you also must consider personal information protection laws, which are nothing to sneeze at.

 

In addition, few people think to shut off remote access as soon as a problem is no more. And if a computer can be accessed from another location, attempts to access it are likely to follow — this time without your employee’s knowing. We have come across cases of such “specialists” wrecking their former clients’ machines to ensure they would again be contacted for help.

 

Never give remote access to people you don’t know and trust

Given limited resources, in some companies it may be impossible to completely avoid remote administration. But you can reduce the risk of cyber incident by enforcing rules that only trusted professionals may have access to your computers.

  • When selecting an IT service provider, make sure you pick a reliable one. It is best to select MSP providers, not untested individuals. Use our partner search tool to find the providers we trust.

  • Teach your employees that they must not make their workplace computers remotely accessible to anyone not specifically permitted by the company.

  • Advise employees to shut off remote access as soon as a problem is solved. It is easy to do with modern systems.

  • Use a reliable cybersecurity solution to manage apps remotely in a safe manner, block malicious resources, including false tech support websites, and detect other online threats.


RECOMMENDED ARTICLE FOR TECHWORLD


 
Epson Works with Youth Groups to Drive Environmental Initiatives
Techworld Date Posted: 11 February 2019 2:08 PM | 77 Views
Epson has partnered with two youth-led organizations to help raise awareness on environmental issues as part of its 2018 to 2019 environmental initiatives, in line with its vision to contribute to the development of.... See More
 
Epson Works with Youth Groups to Drive Environmental Initiatives
Techworld Date Posted: 2:08 PM | 77 Views
Epson has partnered with two youth-led organizations to help raise awareness on environmental issues as part of its 2018 to 2019 environmental initiatives, in line with its vision to contribute to the development of...See More

 
Introducing the new special editions to the moto g family moto G5s and moto G5s plus
Techworld Date Posted: 14 October 2017 2:30 PM | 537 Views
Motorola continues to bring unique and intuitive user experiences that Filipinos love and the two new additions to its moto g family: moto g5s and moto g5s plus, come with the latest innovations in.... See More
 
Introducing the new special editions to the moto g family moto G5s and moto G5s plus
Techworld Date Posted: 2:30 PM | 537 Views
Motorola continues to bring unique and intuitive user experiences that Filipinos love and the two new additions to its moto g family: moto g5s and moto g5s plus, come with the latest innovations in...See More

Rafael Aquino
The Threadripper’s Simple Complexity
Techworld • By: Rafael Aquino | Date Posted: 29 July 2017 4:30 PM | 158 Views
The AMD Ryzen Threadripper is by far the most powerful processor to date. 12 cores and 24 threads each, that is absolutely dwarfing any other processor ever created in the history of mankind. But.... See More
Rafael Aquino
The Threadripper’s Simple Complexity
Techworld • By: Rafael Aquino | Date Posted: 4:30 PM | 158 Views
The AMD Ryzen Threadripper is by far the most powerful processor to date. 12 cores and 24 threads each, that is absolutely dwarfing any other processor ever created in the history of mankind. But...See More

 
Lenovo Continues Support for Youth Organizations, Named Exclusive Technology Partner Anew of TAYO Awards Foundation
Techworld Date Posted: 15 February 2018 5:13 PM | 79 Views
Lenovo, one of the world’s biggest technology companies, is once again the official technology partner of the Ten Accomplished Youth Organizations (TAYO) Awards Foundation, Inc.. See More
 
Lenovo Continues Support for Youth Organizations, Named Exclusive Technology Partner Anew of TAYO Awards Foundation
Techworld Date Posted: 5:13 PM | 79 Views
Lenovo, one of the world’s biggest technology companies, is once again the official technology partner of the Ten Accomplished Youth Organizations (TAYO) Awards Foundation, Inc.See More

 
With Public Cloud Services Disrupted, Businesses Are Urged to Deploy Private Cloud to Minimize Losses
Techworld Date Posted: 2 April 2019 3:56 PM | 71 Views
Gmail and Google Drive experienced service disruptions globally on March 13 for appropriately four hours. Gmail users reported having trouble saving email drafts, sending emails, attaching and accessing attachments while Google Drive users experienced.... See More
 
With Public Cloud Services Disrupted, Businesses Are Urged to Deploy Private Cloud to Minimize Losses
Techworld Date Posted: 3:56 PM | 71 Views
Gmail and Google Drive experienced service disruptions globally on March 13 for appropriately four hours. Gmail users reported having trouble saving email drafts, sending emails, attaching and accessing attachments while Google Drive users experienced...See More

 
F5 Survey Reveals Digital Transformation Initiatives Driving Sudden Surge in Emerging Application Services
Techworld Date Posted: 17 January 2018 5:02 PM | 495 Views
F5 Networks (NASDAQ: FFIV) today announced the results of its 2018 State of Application Delivery report. The global customer survey shows accelerating multi-cloud deployments are enabling organizations to select the cloud platform that best.... See More
 
F5 Survey Reveals Digital Transformation Initiatives Driving Sudden Surge in Emerging Application Services
Techworld Date Posted: 5:02 PM | 495 Views
F5 Networks (NASDAQ: FFIV) today announced the results of its 2018 State of Application Delivery report. The global customer survey shows accelerating multi-cloud deployments are enabling organizations to select the cloud platform that best...See More

 
Most Common Phishing Scams and What You Can Do to Avoid Them
Techworld Date Posted: 27 May 2019 3:58 PM | 79 Views
It has become easy enough to identify and dismiss e-mails from people pretending to be relatives who get in trouble abroad, or from do-gooders asking for help for victims of calamities. These “appeals” have.... See More
 
Most Common Phishing Scams and What You Can Do to Avoid Them
Techworld Date Posted: 3:58 PM | 79 Views
It has become easy enough to identify and dismiss e-mails from people pretending to be relatives who get in trouble abroad, or from do-gooders asking for help for victims of calamities. These “appeals” have...See More

 
Meet Genesis – The Underground E-Shops with Tens of Thousands of Digital Doppelgangers for Sale to Bypass Financial Anti-Fraud Solutions
Techworld Date Posted: 24 April 2019 4:29 PM | 62 Views
Kaspersky Lab has published the results of an investigation into Genesis - an e-shop that is trading over 60,000 stolen and legitimate digital identities, making successful credit card fraud that much easier to conduct..... See More
 
Meet Genesis – The Underground E-Shops with Tens of Thousands of Digital Doppelgangers for Sale to Bypass Financial Anti-Fraud Solutions
Techworld Date Posted: 4:29 PM | 62 Views
Kaspersky Lab has published the results of an investigation into Genesis - an e-shop that is trading over 60,000 stolen and legitimate digital identities, making successful credit card fraud that much easier to conduct....See More

 
Mine a Million Kaspersky Lab Identifies Sophisticated Hacker Group Earning Millions through Mining Malware
Techworld Date Posted: 5 March 2018 4:48 PM | 398 Views
According to Kaspersky Lab researchers, cybercriminals have started using sophisticated infection methods and techniques borrowed from targeted attacks in order to install mining software on attacked PCs within organizations.. See More
 
Mine a Million Kaspersky Lab Identifies Sophisticated Hacker Group Earning Millions through Mining Malware
Techworld Date Posted: 4:48 PM | 398 Views
According to Kaspersky Lab researchers, cybercriminals have started using sophisticated infection methods and techniques borrowed from targeted attacks in order to install mining software on attacked PCs within organizations.See More

 
Lenovo Bolsters PH Lineup with New AMD-Powered Devices
Techworld Date Posted: 6 December 2018 4:47 PM | 317 Views
Lenovo is refreshing its product offerings to Filipino customers with the launch of new laptops that run on AMD Ryzen processors. The release is part of the company’s objective of bringing the latest technology.... See More
 
Lenovo Bolsters PH Lineup with New AMD-Powered Devices
Techworld Date Posted: 4:47 PM | 317 Views
Lenovo is refreshing its product offerings to Filipino customers with the launch of new laptops that run on AMD Ryzen processors. The release is part of the company’s objective of bringing the latest technology...See More


Power by

Download Free AZ | Free Wordpress Themes