The Morning Call (Sunday)

Managing technology in a remote world

- Scott Gingold in the chief visionary officer at Lehigh Valley Technology Company and president of the Executive Forum of the Lehigh Valley.

I recently hosted a Technology Lunch and Learn, the first in the Lehigh Valley since the pandemic struck. My team and I are embracing a newfound sense of normalcy and reconnecti­on with our community. We are on a path to return to business as usual, with a supercharg­ed vision of how technology can improve our lives. In tandem, we are preparing businesses for the next business disruption that can occur.

I consider myself a tech- nology advocate for businesses across the globe, and take pride in matching technology to improve the efficiency and security of companies large and small.

Virtual desktops have garnered a lot of attention since the pandemic, and rightly so. A virtual desktop keeps the company humming along, since staff can access it from any device and at any time, day or night. It is a nimble concept that can adapt to most any situation and increase the security of your company files. I also am a person who always likes to have a “Plan B” in place, and believe virtual can protect us from the next disruptive event that may come our way. I have outlined the main benefits businesses should consider.

Your server

A Windows Virtual Desktop is hosted in an extremely secure cloud server. Traditiona­lly, companies have servers in a room that store and allow access to the mainframe. This can be problemati­c in case of a power outage, flood or fire. The server becomes unavailabl­e and business halts, or in worst case the company data is damaged beyond repair. A virtual server eliminates this from ever happening, as the cloud servers are always online 24/7 and have the critical redundancy backups in place.

Your programs

When setting up a Windows virtual server, you can limit employee access to specific company files, a task difficult to achieve with a VPN access. Software programs, your Word documents and even Outlook emails are all accessed with one simple login. New software can be selectivel­y added in minutes. The cloud servers utilized have 54 server sites worldwide, and with each login, the working server is chosen based on proximity to the user, ensuring the fastest bandwidth possible. If you somehow accidental­ly drop your laptop in a pool of water, buy a new one. All you have to do is login to the virtual server and you are in business again in minutes. How awesome is that?

Your money

An Azure server saves you money by only charging for the number of people using the system at a given time. Most commonly available cloud servers charge you a fixed monthly a rate per user, and if your company has 100 employees or more, that cost adds up quickly. Additional­ly, some employees have a preferred laptop they personally own. With a Virtual Desktop employees can use their own equipment and

simply log in, saving the company the expense of computers.

Your security

Cyber insurance is offered by most insurance companies, and I recommend it for every business. It can be incredibly helpful during a crisis. As I write this, my team is helping a victim of a ransomware attack. The company files are being held hostage for a ransom of $2 million.

While some attacks are random and unavoidabl­e, there are protocols you can put in place at your company to reduce the chances.

The most common method hackers gain access to company files is through passwords that have been inadverten­tly shared. Based on my experience and observatio­ns, below are my recommenda­tions that will significan­tly reduce the possibilit­y of a breach:

■ Do not allow employees to have their passwords written on notes on their computers or visible on their desks.

■ When a disgruntle­d employee is terminated, change all passwords they utilized.

■ Change your passwords every 90 days. Use a password management tool, such as 1password.com to manage the task.

■ Educate employees to bring any questionab­le emails to your attention, even if you appear to be the sender. Hackers can send emails that appear to be from upper management.

■ Have a dark web scan done for your business to determine if your secure informatio­n is being sold on the dark web.

Having all the components mentioned above ensures the optimum “cyber hygiene” and a fiscally sound technologi­cal environmen­t at your business.

 ??  ?? Scott Gingold
Scott Gingold

Newspapers in English

Newspapers from United States