What Annoys You about Remote Access? Part 1

Posted: March 24, 2011 in Industry Commentary, IT policy, Rethink Remote Access
Tags: , , , , ,

The world of remote access is, no doubt, a complicated one. On one hand, we can’t imagine life without it – and on another – it sometimes feels like the bane of every IT administrator’s existence. So, what do end users think of remote access? VPN Haus asked around and got an interesting variety of responses. But no matter the sentiment, it seems people are rarely neutral when it comes to remote access.

Nick Armstrong, a so-called geek superhero, shares the common complaint of elapsed lag times when connecting remotely. He told VPN Haus, “Any time there’s a possibility for lag, I absolutely loathe a remote working environment. Since I work on a Mac, the conversions very rarely work correctly and there’s often a lot of right-click confusion that just shouldn’t be there.”

But here’s where things get complicated. Nick has worked as a software developer and is exceptionally tech savvy and this know-how makes him informed enough to expect better than slow-downs and headaches when connecting remotely.

“If the user interface isn’t simple, I just don’t want to work on it,” he said.  “Also, I really, really dislike having to turn over my computer’s control to an internal IT person to remotely give me access. [It’s] really frustrating considering my level of tech expertise.”

Nick’s frustrations are, unfortunately, far too common. To get around this issue, Nick says he sometimes bypasses IT-mandated remote access for a more efficient option.

“SSH or secure FTP allow for the secure transfer of files,” he explained. “Skype and other communication platforms use encryption, as does GoToMyPC  (the one non-clunky virtual work environment I’ve used). I’d much rather use my own work environment where I can assure productivity rather than be forced into something that ‘meets IT’s standards.’ If my methods are good enough for HIPPA compliance, it should be good enough for a business. “

Nick is an ideal scenario – he’s savvy enough to know to look for secure options when forgoing IT protocols. But the danger comes in when employees who don’t know to look for secure options follow the same path.

What annoys you about remote access? Share your stories with us.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s