Tactical Advice

6 Tips To Help Teleworkers Work

Six tips to keep teleworkers running smoothly.
This story appears in the December 2008 issue of BizTech Magazine.

As companies capitalize on the numerous advantages that telework offers, IT departments must remain vigilant in meeting the challenges inherent in supporting remote users in a variety of environments. Here are six tips for keeping your workers out of trouble when they are out of the office:

1. Secure home setups.


Photo: Comstock/Jupiter Images

When deploying machines to users who work from home, it’s a good idea to perform a brief audit of the connection hardware they are using and determine if it will provide an acceptable level of security. Before they connect for the first time, have your users send your help desk the model number of their connection equipment, and do a little research. Ensure that the hardware is running Network Address Translation — and, if they are using wireless at home, that there is an acceptable degree of wireless security enabled. Consider setting up a standard bundle of equipment that can be sent to users whose configurations are lacking.

2. Consider policy management software.

Employees who work outside the corporate network bring added security concerns, which means IT departments must enhance protection wherever possible. While antivirus and firewall software can minimize these threats, employing third-party policy management (PM) can offer yet another layer of critical protection. Policy management software works by installing a small program on users’ machines that monitors application launches. When a user attempts to launch an application, the PM checks the application against a whitelist of approved applications and lets the program launch only if it is found on the whitelist. This can be an invaluable tool to stop malware attacks, prevent users from installing unauthorized applications and keep your company free of licensing compliance liabilities.

3. Monitor web traffic for suspicious activity.

If your company uses Internet filtering software and employs a virtual private network (VPN) that routes Internet traffic through your corporate gateway, make an effort to regularly scrutinize logs of your remote-user activity. Watch for attempts to access malware websites — or even an unusually high number of hits to IP addresses. Both can be signs of trouble, but if caught early can often result in a simple cleanup of one machine instead of the reimaging of several.

VPN logs also can alert administrators that something is amiss. Most VPNs will log at the very least a given user’s tunnel name, time connected and sent/received packet counts. Discovering that a user has counts that are disproportionately high relative to their session time may be your first sign that something is awry. Consider making a quick audit of VPN logs a daily best practice to ensure that your machines and network stay healthy.

4. Put Network Access Protection to work.

Network Access Protection is included in the Business version of Windows Vista. When this service is enabled and a Health Registration Authority (authenticating server) is in place, a policy can be enacted that will audit workers’ machines for security threats and effectively lock them out of the corporate network until problems are remedied. This accomplishes two things: First, it keeps rogue machines off your network, thereby protecting the rest of your infrastructure and users; and second, it brings remote users to your doorstep who may otherwise have gone undetected, only to return later with more serious issues.

Photo: Comstock/Jupiter Images

5. Enable System Restore.

All versions of Windows XP and Windows Vista come with a handy utility called System Restore. When enabled, System Restore will automatically create “restore points” any time a major change is detected on a user’s system, such as the installation or removal of device drivers or software. If a catastrophic problem is discovered after the change is made, a user can simply boot into Safe Mode and run the System Restore utility to return the computer to the state it was in when the selected restore point was created. While System Restore is normally intuitive enough to leave user data files alone, it is still a smart idea to run a backup before restoring a restore point.

6. Force those critical updates.

While Vista machines by default will download and install critical updates to make machines less susceptible to malware and exploits, the majority of today’s business machines are still running older versions of Windows. It is imperative that critical updates be installed automatically on these machines; do not rely on the end user to do so. While this policy may carry a chance of inconveniencing some users (through unattended reboots), the benefits outweigh the risks. This is especially important for teleworkers because of the threats they encounter when connecting to public networks, which may host infected machines.

Jason Holbert is a Tier II desktop support technician at Harcros Chemicals, a chemical manufacturer in Kansas City, Kan. He has worked in IT for more than 10 years.

Sign up for our e-newsletter

About the Author

Jason Holbert

Jason Holbert

Jason covers desktop applications and help desk utilities, including reviews geared toward the IT end-user support function. Jason is the PC infrastructure manager for Harcros Chemicals, a worldwide leader in chemical manufacturing and distribution. At Harcros, Jason supports over 350 end users at 30 branch locations. In his free time, Jason enjoys reading, motorcycling, competitive shooting and remodeling his starter home with his wife.


Heartbleed: What Should Your... |
One of the biggest security vulnerabilities has almost every user and every industry...
Why Businesses Need a Next-G... |
Devices investigate patterns that could indicate malicious activity.
Review: HP TippingPoint S105... |
Next-generation firewall can easily replace a stand-alone intrusion prevention system....


The New Backup Utility Proce... |
Just getting used to the Windows 8 workflow? Prepare for a change.
How to Perform Traditional W... |
With previous versions going unused, Microsoft radically reimagined the backup utility in...
5 Easy Ways to Build a Bette... |
While large enterprises have the resources of an entire IT department behind them, these...

Infrastructure Optimization

Businesses Must Step Careful... |
Slow and steady wins the race as businesses migrate IT operations to service providers,...
Why Cloud Security Is More E... |
Cloud protection services enable companies to keep up with security threats while...
Ensure Uptime Is in Your Dat... |
Power and cooling solutions support disaster recovery and create cost savings and...


Securing the Internet of Thi... |
As excitement around the connected-device future grows, technology vendors seek ways to...
How to Maximize WAN Bandwidt... |
Understand six common problems that plague wide area networks — and how to address them.
Linksys Makes a Comeback in... |
The networking vendor introduced several new Smart Switch products at Interop this week.

Mobile & Wireless

Mobility: A Foundational Pie... |
Other technologies rely on mobile computing, which has the power to change lives, Lextech...
Now that Office for iPad Is... |
After waiting awhile for Microsoft’s productivity suite to arrive, professionals who use...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.

Hardware & Software

Review: HP TippingPoint S105... |
Next-generation firewall can easily replace a stand-alone intrusion prevention system....
New Challenges in Software M... |
IT trends such as cloud, virtualization and BYOD pose serious hurdles for software...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.