An MSP Approach to Working from Home

August 22, 2024

An MSP Approach to Working from Home

As iTecs and customers face the possibility of having our staff work from home, you should know that remote capabilities are even easier to implement than most believe.

The challenges of working from home:

  • Providing a secure solution that won't jeopardize data or network integrity
  • Access to corporate data and applications

The solutions and their pros and cons:

  1. Terminal Server

Pros –    Easy to set up

A central point of access, easy to secure and backup

Can be used even when your staff returns to the office

Cons –   A solution that requires an RDS server that incurs an expense

  1. VPN Solution

Pros –    Can be implemented with limited costs

Cons –   Difficult and time-consuming to get set up and train staff on how to access their office assets

Can leave the corporate network vulnerable to attacks if the remote computer is not secure

We recommend Terminal Server

As an MSP company, we can help you implement either remote solution. However, we recommend you consider option #1. A Terminal Server is an easy way to allow secure remote access to corporate assets, and the user's computer from which they are using to remote does not need to adhere to corporate standards.

Your company can leverage iTecs Promus data center as the hosting provider for a Terminal Server that can be securely and reliably attached to your corporate network with a site-to-site VPN tunnel.  The site-to-site tunnel can allow the data center hosted Terminal Server to communicate with your file, application, and database servers without having to move any information off your office assets.

A Terminal Server can have any application installed and readily available for your staff; includes but is not limited to, Microsoft Office, QuickBooks, Adobe, SAGE, ACT!, Dropbox, OneDrive, GSUITE, and other software suites.

Latest posts

Claude vs ChatGPT Business Comparison
June 23, 2025

Claude vs ChatGPT Business Comparison

This in-depth comparison guide analyzes Anthropic's Claude and OpenAI's ChatGPT from a business perspective, helping enterprises make informed AI platform decisions. The article covers feature comparisons, pricing analysis, security considerations, industry-specific recommendations, and includes interactive tools like a decision framework and ROI calculator. Claude excels in analytical reasoning and compliance-heavy environments, while ChatGPT dominates in creative content and integrations. The guide provides practical implementation strategies and real-world scenarios to help businesses choose the platform that best aligns with their strategic objectives and operational requirements.
Meta and Yandex Betrayed User Trust: A Privacy Professional's Take
June 19, 2025

Meta and Yandex Betrayed User Trust: A Privacy Professional's Take

Meta and Yandex deliberately circumvented Android privacy protections through sophisticated tracking methods that collected detailed user data from millions of websites. Using techniques like "SDP munging," they created a web-to-app pipeline that defeated incognito mode, cookie deletion, and privacy settings. Even more concerning, similar techniques could potentially affect iPhone users as well. Both companies only stopped after being publicly exposed by researchers. At ITECS, we're working with partners to help clients protect against these unethical practices and advocate for genuine privacy protection.
The Hidden Threat: How Rogue Communication Devices in Solar Inverters Could Bring Down the Power Grid
June 19, 2025

The Hidden Threat: How Rogue Communication Devices in Solar Inverters Could Bring Down the Power Grid

This investigative article exposes the discovery of undocumented communication devices hidden in Chinese-made solar inverters, creating unprecedented vulnerabilities in global power grids. The piece provides real-world attack scenarios from a business owner's perspective, analyzes the broader cybersecurity implications of hardware-level supply chain attacks, and offers actionable guidance for organizations to protect their infrastructure. With over 200GW of vulnerable capacity and the ability to compromise grids with less than 2% of inverters, this threat represents a critical national security issue requiring immediate attention from businesses and governments worldwide.