{"id":753,"date":"2006-04-19T00:00:00","date_gmt":"2006-04-19T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/04\/19\/telecommuting-security-concerns-grow\/"},"modified":"2021-12-30T11:38:06","modified_gmt":"2021-12-30T11:38:06","slug":"telecommuting-security-concerns-grow","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/04\/19\/telecommuting-security-concerns-grow\/","title":{"rendered":"Telecommuting security concerns grow"},"content":{"rendered":"<p>IT managers say key concern is ensuring telecommuters&#8217; PCs keep pace with corporate security guidelines.  Telecommuting has become a way of life as more companies let employees work from home to do jobs that might otherwise be done on corporate premises.  Last year an estimated 8.9 million telecommuters worked from home three or more days each month during regular business hours, according to IDC.  At places where home-based work has become the norm, IT managers say a key concern is ensuring each telecommuter&#8217;s PC &#8211; typically granted remote access to a corporate LAN &#8211; keeps pace with office security guidelines.  According to IDC, healthcare is the industry in which telecommuting is most common, followed by the science and technical services arena, and manufacturing.  The financial-services industry is stepping gingerly into telecommuting, with IT managers aware that government regulators and auditors will want to know about security controls on home-based computers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;We have a fair number of employees who are telecommuters,&#8221; says Dan Lukas, lead security architect at Aurora Health Care in Wisconsin, which operates 13 hospitals and dozens of clinics and has about 25,000 employees.  These transcriptionists, situated all over the country, then remotely access Aurora&#8217;s private-line network over the Internet to file each transcribed recording with a patient&#8217;s online medical records.  &#8220;More and more, physicians want access to their offices from home, and we&#8217;re giving radiologists secure access so they can read images from home,&#8221; says Bob Burritt, Kettering Medical Center Network&#8217;s director of technology.<\/p>\n<p>Lukas says Aurora transcriptionists who telecommute are given PCs with a standard image on them for hospital applications and security, such as anti-virus.  The hospital is migrating from a Cisco IPSec VPN to a Juniper SSL VPN, because it doesn&#8217;t require special agent-based software to deploy.  <\/p>\n<p>Despite the industry buzz about automated procedures for checking a user&#8217;s anti-virus and patch updates before granting network access, Lukas says Aurora officials, who recently tested Cisco&#8217;s Network Admission Control products, believe that for the moment it&#8217;s not a mature technology and is too expensive.<\/p>\n<p>Consultant Tom Walsh recommends that organizations adopting telecommuting equip at-home employees with dedicated PCs to be used for work only.<\/p>\n<p>http:\/\/www.networkworld.com\/cgi-bin\/mailto\/x.cgi<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-753","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/753","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=753"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/753\/revisions"}],"predecessor-version":[{"id":3240,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/753\/revisions\/3240"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=753"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=753"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=753"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}