Vulnerabilities / Threats // Insider Threats
12/3/2008
05:15 PM
Connect Directly
LinkedIn
RSS
E-Mail
50%
50%

What Not To Do For Your Road Crew

IT telecommuting traps to avoid.

There are several ways IT can destroy the productivity and happiness of hotel-hopping travelers. Learn from the real-world mistakes of others and avoid some of these pitfalls for your on-the-go employees.

Misconfigured backup client: While it's vital to have some sort of backup for staff who don't frequent the office, a misconfigured backup client can wreak havoc on the performance of off-site employees. Where possible, closely identify which file types will be backed up, as well as where they should be stored, and communicate that policy to staff.

Windows updates: The problem happens when your CEO checks into his hotel, powers on his laptop, and gets Windows XP SP3 forced down his throat. The orderly distribution of updates can be done in a more friendly way via Windows Server Update Services. Alternatively, group off-site workers into an Active Directory Organizational Unit that has a relaxed set of update policies.

Lack of a plan B: You'll eventually get a call from the most important person, at the worst possible time, telling you she can't connect to the network. Whether it's a VPN client issue, network connectivity, corrupted application--whatever it may be, have a backup plan. If a VPN client bombs, can you serve out a remote desktop? If a hotel's network is problematic, can the employee tether a smartphone to the laptop for Internet access? If Office gets corrupted, can you deliver an online version through Citrix or Microsoft Terminal Services? If you can plan ahead for disaster for your road warriors, you'll thank yourself later.

Photo by Getty Images

Return to the story:
Five Ways To Arm Your Mobile Workforce

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0750
Published: 2015-05-22
The administrative web interface in Cisco Hosted Collaboration Solution (HCS) 10.6(1) and earlier allows remote authenticated users to execute arbitrary commands via crafted input to unspecified fields, aka Bug ID CSCut02786.

CVE-2012-1978
Published: 2015-05-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Simple PHP Agenda 2.2.8 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add an administrator via a request to auth/process.php, (2) delete an administrator via a request to auth/admi...

CVE-2015-0741
Published: 2015-05-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Cisco Prime Central for Hosted Collaboration Solution (PC4HCS) 10.6(1) and earlier allow remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCut04596.

CVE-2015-0742
Published: 2015-05-21
The Protocol Independent Multicast (PIM) application in Cisco Adaptive Security Appliance (ASA) Software 9.2(0.0), 9.2(0.104), 9.2(3.1), 9.2(3.4), 9.3(1.105), 9.3(2.100), 9.4(0.115), 100.13(0.21), 100.13(20.3), 100.13(21.9), and 100.14(1.1) does not properly implement multicast-forwarding registrati...

CVE-2015-0746
Published: 2015-05-21
The REST API in Cisco Access Control Server (ACS) 5.5(0.46.2) allows remote attackers to cause a denial of service (API outage) by sending many requests, aka Bug ID CSCut62022.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.