Why Virtual Desktops are Rapidly Gaining Popularity

The pandemic changed how many organizations perceive and use remote work. Work-from-home is now commonplace, and for many is the difference between staying with their current employer or looking for a new opportunity. Work-from-home offers many benefits both for the employee and the employer. However, there are a number of IT challenges that come from work-from-home that organizations are now seeking to address. 

 

The Device

What device should an employee work on? 

A Company-provided Device

Pros

  • Business - It is easier to secure these devices.

  • Business - Ensures all employees have adequate devices to do their job. 

  • Business - The business has control over what applications are installed on the device. 

  • Employee - Doesn't have to use their personal device for work or have work software installed on it. 

Cons

  • Business - These devices are difficult to manage, especially if there is employee turnover. 

  • Business - The employee may use the work device for personal use opening the business up to potential cyber threats or liability for the employees' actions.

  • Business - has to buy/provide computer equipment and additional software to secure it. 

  • Employee - The employee may not have room for a second device or the type of device the company wants them to use. 

  • Employee - May not like the aesthetic of the device the company chooses.

An Employee-owned Device

Pros

  • Business - Reduced capital requirements

  • Business - No liability for employees' non-business-related activities

  • Business - No issues with device management during employee turnover

  • Employee - No need for additional space for business-provided equipment. 

  • Employee - Has control of the device aesthetic and footprint.

Cons

  • Business - Security is virtually impossible to manage/impose on these devices. 

  • Business - No way to ensure all employees have equal, adequate devices/software to perform their duties. 

  • Business - No authority to dictate software that cannot be on the device

  • Business - Unable to legally use most business-owned software on employee-owned devices. 

  • Employee - May feel imposed upon for being asked to use their personal device. 

  • Employee - May worry employer may violate their privacy with regard to their personal use of their device.

 

Potential Threats

Internet

Each home's internet service, router, and other network components may vary. Most home routers provide virtually no security features, and because the business has little control over the network infrastructure, router, and Internet Service Provider, there is a potential that traffic could be intercepted and even decrypted and different stages in the process.  

Network

No two home environments are the same. In many home environments, there are a growing number of devices on the network, including other computers, gaming consoles, security cameras, garage doors, watering systems, appliances, televisions and much more. These internet-enabled devices, if not updated regularly, can be breached and used to compromise computers on the network. This could potentially result in corporate data being accessed if the device (business or employee-owned) was compromised. 

VPN

Many businesses use VPNs to connect back to their corporate network. VPNs encrypt traffic back to the office and provides access to corporate IT resources. 

Data Leakage

Theft

Many organizations have proprietary data and customer data they would not want to be shared with competitors or other parties. Additionally, most organizations store data PII, financial information, etc., that could potentially be stolen and used/sold for gains. 

According to recent studies, corporate data theft has increased significantly due to work-from-home as disgruntled employees feel less supervised, and organizations have less control over data security in home environments. 

Compliance

All Canadian organizations must be compliant with PIPEDA, and many organizations are required to comply with regulatory and/or contractual requirements. In most cases having data accessible but unmonitored and unprotected in a work-from-home environment fails to meet these compliance requirements. 

 

Cloud PCs / Virtual Desktops to the Rescue

Cloud PCs / Virtual Desktops are just like a normal desktop you used to when you turn on your computer the only difference is that it's running somewhere central such as in a datacenter or the cloud. 

How it works

Each user is assigned a Cloud PC / Virtual Desktop, and all the software required for the organization is installed on this device, including security, data loss prevention, and secure connections to corporate resources. 

A small application is installed on the employee's home computer, laptop, or any number of computers they may use. This application is simple to install and requires very few resources. When the employee launches the application, from whatever device they are on, they are prompted to log in. Once logged in, they gain full-screen access to their work virtual desktop as if it were the computer they were on. 

With this solution, the business is in ultimate control over the IT/cybersecurity of the device, and all data stays in the Virtual Desktop environment and is never on the employee's home network.

This solution enables employees to use their own device(s) and change devices freely when they want while providing the convenience and security businesses need to secure their data and meet their compliance requirements. 

Our Recommendation

happier IT uses and recommends Microsoft Windows 365 for your organization's Cloud PC / Virtual Desktop solution. 

To learn more about Windows 365 or other Virtual Desktop solutions such as Amazon Workspaces or Terminal Servers, contact your Client Success Manager at team@happierit.com.

If you're not yet a happier IT client and are interested in learning more, please click the following link to schedule a call with a happier IT sales representative

 

Related Articles

Previous
Previous

What is Your End-of-Life Strategy for Your IT Equipment?

Next
Next

How Often Should You Replace Your IT Equipment?