All
All

User's Guide to Securing External Devices for Telework and Remote Access

334 KB | 3 files | null PDF,null DOC

Most remote workers use some form of remote access to connect to the corporate network and messaging systems. This guide will help your team decide on the best and most secure method for providing remote access.

Many people telework (also known as telecommuting), which is the ability for an organization's employees and contractors to conduct work from locations other than the organization's facilities.

Teleworkers use various devices, such as desktop and laptop computers, cell phones, and personal digital assistants (PDA), to read and send e-mail, access Web sites, review and edit documents, and perform many other tasks. Most teleworkers use remote access, which is the ability of an organization's users to access its nonpublic computing resources from locations other than the organization's facilities. Organizations have many options for providing remote access, including virtual private networks, remote system control, and individual application access (e.g., Web-based email).

This Special Publication is part of a series of reports by the Information Technology Laboratory at the National Institute of Standards and Technology that focus on research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations.

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.pdf
  • User's Guide to Securing External Devices for Telework and Remote Access.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

NIST is a non-regulatory federal agency within the U.S. Department of Commerce. NIST's mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards and technology in ways that enhance economic security and improve our quality of life.

All IT Downloads from National Institute of Standards and Technology» | Visit National Institute of Standards and Technology »
Related IT Downloads

Compliance2 Building a GRC Program: Assessing Stakeholder Needs and Readiness

This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs for the GRC program. ...  More >>

IT_Man77 Job Description: Technology Project Manager

Whether you're looking to hire one or looking for a position yourself, use this detailed job description to find out what the role of a Technology Project Manager entails. ...  More >>

Strategy2.jpg Case Studies in Strategic Planning

Chapter 1 delves into the first four stages of systematic strategic planning, including clarifying current conditions, identifying competitive advantages, defining opportunities and developing strategies. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.