Info Tech Stats: Response to peer discussion(300 words) in 5 hours

 Telecommunications Working from home  Security and remote working can be a headache for digital nomads, and their clients or employers. If you’re a remote worker and have multiple clients, sometimes in different locations around the world, you may need to use different security applications for each of them. You will probably have to comply with multiple policies and regulations and may feel anxious about accessing and inadvertently compromising a client’s network. And, on the other hand, it is understandable if you are wary of giving up some of your own privacy to your employer (wang, qiao & lima, 2018) .  It’s not just remote workers themselves who are at risk. Permanent employees who occasionally do work at home can face (and cause) security issues when remotely interfacing with an organization’s network.  Let’s say we have a situation where our organization has 20 sales representatives working outside organization remotely.  Case: Letter to CEO  If we like to have remote team in our organization first we need to convince every one because there are several risks involved first we need to point the risk then has to come up with possible solutions  Here in the letter we start with identification of risk. Here are some of the risks faced by the organization.  Connection quality. If the user has a poor internet connection or a weak Wi-Fi signal, both of which are common at hotels or public hotspots for example, then the remote desktop connection will also be slow. Accessing applications or files becomes cumbersome.  VPNs. VPNs, or virtual private networks, are very sensitive. Many public internet connections will not allow users to work at all, making remote connection almost impossible.  Performance. There are many low-cost methods available, such as LogMeIn and GoToMyPC that simply do not have the speed necessary for accomplishing hours of work. The delays inherent in these solutions mean they are only viable options for quick tasks or small amounts of work. In addition, they may not allow for local file and printer access(Diekmann & Naab, 2019).  Security. Public hotspots are common at coffee shops, airports, hotels, and even public parks. While they are convenient, they are also highly susceptible to hackers who would be able to access any of the data you’re working on while using the shared Wi-Fi.  Application availability. Systems like Citrix and Terminal Server only allow access to certain programs that have been configured by the IT administrator. Often times, users need access to applications they installed themselves, special plugins, configurations, or files from their desktop, or other resources that are not on the remote access server. What’s more, these systems often work differently than the desktops. This change in habitual processes is inconvenient and sure to slow any user down.  Open applications. If a user left files or applications open on their business desktop, they are locked there. It is impossible to log in to them a second time from a remote access system.  These are the issues faced due to the remote users using tools like wire shark, Firewalls, Anti-virus, VPN, Backup plans, role-based access etc can solve the problems  Some tools and there functionality’s  Pulseway offers you total control of your PCs, no matter where from it is or when it is. You can monitor and manage Windows, Mac Operating Systems, and Linux as well as any application using the monitoring API. It dramatically reduces the level of manual checks for support engineers and provides them with a real time status of their monitored systems. You are the first to know about any potential issues affecting your systems and can resolve those issues immediately(Diekmann & Naab, 2019).  Remotely monitor and control your IT systems Current available memory and historical graphical usage Network interfaces and traffic table state Current available memory and usage history chart Status of web sites and application pools in Internet Information Server SolarWinds Kiwi CatTools(A must have for all small or low-budget companies)  This tool comes from the leading network management and analysis company, “SolarWinds”; Kiwi CatTools supports automatic backup and update activities for multivendor network devices. such as Nortel routers, Cisco switches, and ASA firewalls with central GUI-based network management. While resolving a network issue, you can compare past and present configurations to find the changes quickly. Kiwi CatTools can be installed on Microsoft Servers or desktop Windows platforms so that you can manage your network’s configurations from your computer as well.               References  Wang, L., Yu, J., Qiao, B., Lima, S., & Rocha, Á. (2018). Intelligent evaluation of computer network security based on neural network. Journal of Intelligent & Fuzzy Systems, 35(3), 2887–2891.  Diekmann, C., Naab, J.Agile Network Access Control in the Container Age. (2019). IEEE Transactions on Network and Service Management, Network and Service Management, IEEE Transactions on, IEEE Trans. Netw. Serv. Manage, (1), 41.  FEDERAL BUILDING SECURITY: Actions Needed to Help Achieve Vision for Secure, Interoperable Physical Access Control. (2018). GAO Reports, 188. Retrieved from 

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our Guarantees

Money-back Guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism Guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision Policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy Policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation Guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more