Enterprise-Grade IT Security for Small and Medium Businesses by Unknown

Enterprise-Grade IT Security for Small and Medium Businesses by Unknown

Author:Unknown
Language: eng
Format: epub


66

Chapter 5 | Remote Connectivity

Depending on how these third-party services are configured and depending on what part of their infrastructure is compromised, multiple machines within the environment could become compromised.

While it may seem like these services provide a secure way to access internal resources, the risk of using them is too high. Any service or system that isn’t under the control of the company and gains access to the company’s resources is problematic at the very least.

While these services advertise that they provide a secure way into your company, they open a connection between the desktop computer on which their software is installed and the service’s machines. The basic design of these systems is a security issue, as any software package that is designed to maintain an open connection between companies’ resources is going to be a security issue.

These systems must maintain such a connection, as they are designed to allow you to connect to the computer from any web browser. This requires that the service maintain a connection to the computer at all times so that the user is able to access their computer at any time. This means that there is a third-party service that is only going to allow the authored user (according to them) to connect.

When it comes to IT security, the risk when using a third-party service to grant this sort of remote desktop access is simply too great. System administrators can ensure that access to these systems is prevented by blocking access to them from company computers. This is done by putting rules in the company’s firewalls that prevent access to these systems so that in the event that users attempt to go to these services’ websites they are not able to do so.

The best way to prevent these sorts of solutions from being used is to provide a solution that fits the needs of the employees. This could be a virtual private network, such as was described earlier in this chapter, or a remote desktop service, such as the Azure Virtual Desktop service, which is described next.

Azure Virtual Desktop

Microsoft Azure has a service available called Azure Virtual Desktop. This service allows you to create virtual computers within the Microsoft Azure cloud environment. These virtual machines can be configured with a Windows desktop operating system, such as Windows 10 or Windows 11, and can have any software needed installed on them. The Microsoft Azure environment can be configured to have a site-to-site virtual private network linking to the office network. This allows any information transmitted over the connection to the office to be encrypted, which prevents anyone from monitoring the connection.

Enterprise-Grade IT Security for Small and Medium Businesses

67

The Azure Virtual Desktop service can be configured to provide the employee either a normal Windows desktop, so the user can install software and use the virtual machine, or the virtual machine can have specific software installed on it, and that software can be published so that the user has an icon for the specific software when they log in to the service.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Whisky: Malt Whiskies of Scotland (Collins Little Books) by dominic roskrow(56049)
What's Done in Darkness by Kayla Perrin(26607)
The Fifty Shades Trilogy & Grey by E L James(19089)
Shot Through the Heart: DI Grace Fisher 2 by Isabelle Grey(19073)
Shot Through the Heart by Mercy Celeste(18946)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 10 by Isuna Hasekura and Jyuu Ayakura(17125)
Python GUI Applications using PyQt5 : The hands-on guide to build apps with Python by Verdugo Leire(17008)
Peren F. Statistics for Business and Economics...Essential Formulas 3ed 2025 by Unknown(16886)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 03 by Isuna Hasekura and Jyuu Ayakura & Jyuu Ayakura(16835)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 01 by Isuna Hasekura and Jyuu Ayakura & Jyuu Ayakura(16460)
The Subtle Art of Not Giving a F*ck by Mark Manson(14368)
The 3rd Cycle of the Betrayed Series Collection: Extremely Controversial Historical Thrillers (Betrayed Series Boxed set) by McCray Carolyn(14151)
Stepbrother Stories 2 - 21 Taboo Story Collection (Brother Sister Stepbrother Stepsister Taboo Pseudo Incest Family Virgin Creampie Pregnant Forced Pregnancy Breeding) by Roxi Harding(13660)
Scorched Earth by Nick Kyme(12779)
Drei Generationen auf dem Jakobsweg by Stein Pia(10973)
Suna by Ziefle Pia(10896)
Scythe by Neal Shusterman(10356)
The Ultimate Python Exercise Book: 700 Practical Exercises for Beginners with Quiz Questions by Copy(10069)
De Souza H. Master the Age of Artificial Intelligences. The Basic Guide...2024 by Unknown(10023)
D:\Jan\FTP\HOL\Work\Alien Breed - Tower Assault CD32 Alien Breed II - The Horror Continues Manual 1.jpg by PDFCreator(10022)