An MSP Approach to Working from Home

August 22, 2024

An MSP Approach to Working from Home

As iTecs and customers face the possibility of having our staff work from home, you should know that remote capabilities are even easier to implement than most believe.

The challenges of working from home:

  • Providing a secure solution that won't jeopardize data or network integrity
  • Access to corporate data and applications

The solutions and their pros and cons:

  1. Terminal Server

Pros –    Easy to set up

A central point of access, easy to secure and backup

Can be used even when your staff returns to the office

Cons –   A solution that requires an RDS server that incurs an expense

  1. VPN Solution

Pros –    Can be implemented with limited costs

Cons –   Difficult and time-consuming to get set up and train staff on how to access their office assets

Can leave the corporate network vulnerable to attacks if the remote computer is not secure

We recommend Terminal Server

As an MSP company, we can help you implement either remote solution. However, we recommend you consider option #1. A Terminal Server is an easy way to allow secure remote access to corporate assets, and the user's computer from which they are using to remote does not need to adhere to corporate standards.

Your company can leverage iTecs Promus data center as the hosting provider for a Terminal Server that can be securely and reliably attached to your corporate network with a site-to-site VPN tunnel.  The site-to-site tunnel can allow the data center hosted Terminal Server to communicate with your file, application, and database servers without having to move any information off your office assets.

A Terminal Server can have any application installed and readily available for your staff; includes but is not limited to, Microsoft Office, QuickBooks, Adobe, SAGE, ACT!, Dropbox, OneDrive, GSUITE, and other software suites.

Latest posts

How to Deploy Self-Hosting DeepSeek-R1 Using Ollama Implementation Guide
April 19, 2025

How to Deploy Self-Hosting DeepSeek-R1 Using Ollama Implementation Guide

Our Self-Hosting DeepSeek-R1 Using Ollama guide provides organizations with a comprehensive technical roadmap for deploying AI models within their own infrastructure. From hardware selection and installation to performance optimization and security hardening, this guide covers the complete implementation process with expert insights at each critical phase. Learn how to select appropriate model sizes based on your hardware capabilities, implement web interfaces for user access, and properly secure your AI deployment. This guide demonstrates how organizations can leverage powerful AI capabilities while maintaining complete data privacy and control.
Shutup10 Privacy Settings Tool
April 14, 2025

Shutup10 Privacy Settings Tool

Anyone who has configured a new installation of Windows 10 has seen there are a large amount of privacy, location and performance settings in the operating system. The sheer amount of selections available to adjust can be discouraging to even an experienced IT professional. Considering the multitude of options available it can be difficult, if almost impossible, to find them again later on - much less to remember them all! Enter O&O Software’s humorously named O&O ShutUp10.
Scam robocalls pretending to be Apple
April 14, 2025

Scam robocalls pretending to be Apple

We've received reports that customers are receiving calls from a company claiming to be Apple informing them that their Apple ID has been compromised. The culprits are calling random numbers, mainly in the United States. If you follow their prompts to "secure your account" you'll be transferred to a call center in India who will then try to get as much personal information from you as possible; they will try to get your credit card information to charge a fee to secure the compromised account.