Lessons from the desk: working from home

working from homeI’m sitting at my desk this morning watching the snow fall, for what seems like the thousandth time over this very long winter. The reaction to the snow from friends on Facebook today is a mix of excitement and disappointment. Most are understandably anxious at the thought of having to head out to brave the icy northern New Jersey roads to get to work. I am one of the fortunate, tapping away from the warmth and comfort of my home office. Or as my family likes to call it, the living room. No loss of productivity for me today. And thanks to technology, no time wasted on a long, scary commute. This is true for me on a daily basis. But I also know that working from home is not without its challenges. A relative newbie to this remote-access world, I’ve learned some valuable lessons.

  1.  Work a schedule. Don’t let your schedule work you. Time can really get away from you when you work alone, if you’re not careful. I have created a regular, day-in-the-life-of-me, schedule to help me maintain productivity and ensure that I work a regular day. When I first started, and sometimes I can still do this, I just don’t stop. Now, sometimes that’s the benefit of a remote work opportunity. Take last night. I had an idea, so I worked on it for a few hours after dinner. In the past, that might have meant jotting down some notes and possibly losing the momentum of my awesome idea! A work/life balance is really important. Don’t let your workload determine your schedule.
  2. Distractions are a blessing and a curse. We’ve all been on both sides of co-worker distractions in the office. Pop your head into someone’s office to ask about the weekend. Chat about the game at the coffee maker. Hey, water cooler conversations are real and very necessary to help break up the day. At home, the cat isn’t really interested in my reaction to the mid-season premiere of Marvel’s Agents of Shield (she’s sort of stuck up anyway). Thanks to technology, conversations held over Microsoft Lync or Citrix GoToMeeting, can sometimes feel like we’re talking through cubicle walls. The difference is, in a remote situation I have greater control over these distractions. A story on the news yesterday, talked about how to politely avoid productivity-sapping distractions from co-workers. Never an issue when you work remotely. Simply change your Lync chat status and get to work.
  3. You’ve got to move it, move it. Seriously. I just got a fitness band and have it set to vibrate when I’ve been still too long. Well, if the ever rising number on the scale isn’t enough to tell you to get up, having your wrist vibrate every hour surely must be. Think about it. You’re not moving as much when you work remotely. You’re not walking to the car/train/bus. Or walking from the car to the office. Back to the car (more than one or twice a day if you leave the office for lunch or appointments). And then again from the car to the house. Now, you’re walking from room to room and probably not that often. Make time to move more. Hit the gym in the morning, take a walk at lunch, or schedule more play time with your family. I promise, when this snow finally melts, this fitness band will vibrate no more!

Of course, never stop learning and improving your situation. I could tell you about how quickly my kids learned to stop speaking when the office phone rings. Or how I always win the battle for the WiFi signal on a snow/vacation day. You could help me figure out how to keep the cat off my desk. Maybe another time. I will tell you that one more blessing/curse to working from home means that while I was able to get an early start this morning, I now have time to shovel once the snow finally stops. At least that fitness band can’t complain.

What have you learned working from home? Share your tips and lessons below. Also, if you’re interested in learning more about how to virtualize your workforce the way Custom Systems has, we’d love to hear from you!

 

Lynn

 

 

Lynn McGinnis
Marketing Specialist
lynn.mcginnis@customsystems.com

 

 

 

©Copyright Custom Systems Corporation 2015

 

It’s all about the data… And secure, remote access

shutterstock_NeyroIt always comes down to data. In order to function properly in their jobs, employees need access to data. Along with access to the data, they need a comprehensive method of utilizing the data. In the office, employees  have secure access to the data they are permitted and the means to utilize the data. However, the company office is not the only place users require access to data.

We now have users that work from home, mobile, and remote offices. We have many types of portable devices, Wi-Fi access, and the Internet at our disposal that we can be just about anywhere and be need access to company data. So, if employees are not in the office, how do we make it possible for them to securely access data and provide the means to utilize it?

There are many solutions we could implement to offer our users secure remote access to data. Each one has its pros and cons involving ease of use, security, performance, and comprehensiveness. All the methods have the ability to be secure (some more secure than others). All solutions have the ability to require users authenticate/logon. In fact, depending on how each access solution is implemented, they all have the ability to make use of two-factor authentication. All methods have a varying level of complexity to implement. Here are some of the most common solutions:

  • Public Facing Websites – a website that is accessible to the Internet to provide users access to data in the company’s private data center. Security can be provided by SSL encryption and user authentication (logon). The webpage provides the GUI for users to comprehensively utilize data. The application being used can determine how viable a website solution is. Many third-party applications already provide web based access. For instance, almost every third-party e-mail solution of today has the ability to provide access through a webpage. In-house developed applications may or may not have been created with web access and may not be viable for straight access through the Internet. The biggest con to a web-based solution is security. You are providing a public doorway to your data with a webpage. If you do everything correct in securing the page you should be fine, but there is always risk.
  • Cloud Services – in essence, another form of web based access to data with differences. For instance, one difference may be where the data resides. Cloud based solutions do not always keep the data in the companies private data center. The data could reside at the data center of the cloud solutions provider instead. Required hardware and security are then provided by the cloud provider. Enterprise organizations may have the means to offer their own cloud based solutions, but most small to medium companies will need to lease a cloud-based solution. Cloud services is a subject in itself.
  • VPN – a Virtual Private Network solution offers a user remote connections directly to the company network and behave as if the user is on the local network. Using features like split-tunneling, communications meant for the company network can be segregated from other communications the user may be utilizing (i.e. Internet browsing). The most common form of VPN today is an SSL VPN. As the name implies, it utilizes SSL encryption for security. Almost all VPNs in use today utilize Internet access. However (believe it or not) some organizations still require the higher security of dial-in access. The problem with a VPN is that though it does a great job of getting you connected to the company network, you still need a method of utilizing the data. Once connected through a VPN, a user can access an internal web site, run an application that is on their device that knows to connect to data through the VPN, or access something on the network that will enable the user. This solution is probably the easiest to implement for an administrator, but it can also be the one with the highest learning curve for the user. Many times, the users will have to take extra steps in order to enable proper data access.
  • Remote Desktop Services (RDS) or Citrix XenApp – RDS comes with Windows Server (2008 or 2012). It allows users to access server based desktops or applications. The user is given access to either a full desktop or just specific applications. The desktops or applications are all running on a server back in the data center. The data and the applications are never on the remote user’s device. Only keyboard presses, mouse movement, and changes in video are transmitted between remote device and data center. The data remains safely in the datacenter. In this solution, users are sharing server resources, but do not interact with each other. RDS requires Client Access Licenses for each accessing user. Citrix XenApp installs on top of RDS and enhances RDS abilities (think of it as RDS on steroids). RDS was designed by a combined team of Microsoft and Citrix specialists, so Citrix knows how to enhance RDS. XenApp is faster, more secure, easier to administer, and has more features than RDS. I have been working with Citrix XenApp and its predecessors since the late 90s and love it, so I am a little biased when I say that this is my preferred solution.
  • Virtual Desktop Infrastructure (VDI) – refers to Citrix XenDesktop, VDI-in-a-Box, VMWare View, and similar products. In this case, users connect remotely to a virtual machine that is running a desktop OS (Windows XP, 7, or 8). Like RDS and XenApp, the data stays in the datacenter. Only keyboard presses, mouse movements, and screen changes are transmitted. The difference is that the user is accessing a desktop with its own resources instead of sharing resources with other users. Applications installed on the desktop provide users with the comprehensive access to data with a high level of compatibility for applications. This solution is generally more expensive to implement, but it can also be one of the most secure and comprehensive ways to enable users both locally and remotely.
  • Remote PC – this refers to services like VNC, LogMeIn, and even Citrix XenDesktop. In this case, the user is taking remote control of a physical PC/workstation in the company office. For instance, a user has a desktop that they work on in the company office. When the go external to the company office, they can connect back to their company office desktop and control it remotely. This provides the user with the same working environment internally and externally. However, this method tends to be a little slower and is affected more by bandwidth and slowness issues. I mention Citrix XenDesktop again because XenDesktop has a feature where it can have an agent on a physical desktop and provide that desktop to a user instead of a virtual machine. Because it uses Citrix’s ICA protocol and access methods, Citrix’s Remote PC solution tends to provide higher performance than others.

There are many other solutions for accessing data from the outside world, but not enough time to explain each here. I have instead listed the ones I consider the most prevalent. There is one consideration in the securing of data that I did not stress and I am going to do so now. The safest place for your data is in the datacenter. If data is stored on or copied to a remote device, it is harder to keep the data safe. If data is stored only on a remote device and not on the network, loss of that device through hardware failure or theft will most likely be irreplaceable loss of that data. Solutions like RDS, VDI, Citrix, and remote PC keep the data in the datacenter and still allow the users adequate access to it. VPN solutions allow for and sometimes need to have data on a remote device. When deciding on a method of access, keep in mind where you want the data to be stored and how you want it accessed. That should be one of the primary deciding factors.

Questions? As always, please post your questions or comments below.

 

AZS-3

 

Craig R. Kalty (CCIA, CCEE, CCA, MCITP:EA, MCITP:SA, VCP)|
Sr. Network Consultant
Craig.Kalty@CustomSystems.com

 

 

 

© 2014 Custom Systems Corporation