Last updated on Feb 20, 2024
- All
- IT Services
- Technical Support
Powered by AI and the LinkedIn community
1
VPN and RDP
2
Cloud services
3
Remote access software
4
Security tips
5
Here’s what else to consider
Sometimes you may need to access your work computer from home, whether it's for a project, a meeting, or an emergency. However, you don't want to compromise the security of your data or your network. How can you do it securely? In this article, we'll show you some options and tips to remotely connect to your work computer without exposing yourself to hackers or malware.
Top experts in this article
Selected by the community from 388 contributions. Learn more
Earn a Community Top Voice badge
Add to collaborative articles to get recognized for your expertise on your profile. Learn more
-
6
- Aamir Hameed Sr. IT Engineer at Saleh Al Hamad Al Mana Group of Companies, Nissan Qatar
5
- Marcellus (I) T. Driving Excellence in Cybersecurity Practices | CompTIA CySA+🏅| Cybersecurity LinkedIn Author
2
1 VPN and RDP
One of the most common and secure ways to access your work computer from home is to use a VPN (Virtual Private Network) and RDP (Remote Desktop Protocol). A VPN creates a secure and encrypted tunnel between your home computer and your work network, allowing you to access the resources and files on your work computer as if you were in the office. RDP is a protocol that lets you control your work computer's desktop, applications, and settings from your home computer. To use this option, you need to have a VPN client installed on your home computer, and your work computer needs to have RDP enabled and configured. You also need to know your work computer's IP address or hostname, and your login credentials.
Help others by sharing more (125 characters min.)
-
Follow your company's protocols! VPN, remote access software, and cloud services are all viable options. Always protect your home network and devices.
LikeLike
Celebrate
Support
Love
Insightful
Funny
38
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
- Riyaz Ahamed Assistant General Manager - PSBS at iWorld Connect
VPN and RDP- VPN is secured way of connecting to your office network - VPN and RDP became basic need of any IT Professional to support their organization anytime anywhere over the internet.- Using 2Factor authentication for the VPN and RDP will add one layer of security.
LikeLike
Celebrate
Support
Love
Insightful
Funny
11
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
- Diego Borba Analista de Suporte TI | Suporte Técnico | Infraestrutura e Telecom | Gestão de TI
VPN e RDP são sim boas idéias para realizar acesso remoto, mas devemos nos atentar a inúmeras váriaveis para aplicar esse acesso de forma segura. Saliento que é de suma importancia a VPN fechada antes da conexão com RDP, e em cima desta VPN autenticações seguras como um bom projeto de MFA são essenciais. Regras devem ser revistas no firewall de recepção da autenticação da VPN para que o usuário remoto acesse somente o que for realmente preciso. Desta forma há um controle melhor dos acessos e é possivel mitigar problemas que possam surgir.
Translated
LikeLike
Celebrate
Support
Love
Insightful
Funny
7
(edited)
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
- Kenneth S. Celebrating 4 decades of creating trusted IT relationships and exceptional client experiences.
Many excellent firewalls have VPN capabilities built-in. It is critical, however, that firewalls are kept up-to-date with the latest firmware and active subscriptions.Whether you connect with VPN, or remote access software, or a combination, be sure to also use multi factor authentication, such as Duo or Microsoft Authenticator, for an added layer of protection. Avoid using SMS texts because SMS can be easily manipulated.
LikeLike
Celebrate
Support
Love
Insightful
Funny
5
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
-
There are many ways to access your work computer from home, but if you have an IT Department or IT Provider, you'll need to start there. If you don't have either and need to do something on your own, there are options like Zoho Assist where you can install an agent and have unattended access to up to 5 computers with a FREE account. (I would highly recommend a strong, unique password + multi-factor authentication.)If you have a VPN connection to your office network, you can use Remote Desktop -- but under NO circ*mstances should you EVER open/forward ports on a firewall to make this happen. (Again, ideally, your VPN password should be strong and unique, not the same as your Desktop PC password.)
LikeLike
Celebrate
Support
Love
Insightful
Funny
5
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
Load more contributions
2 Cloud services
Another option to access your work computer from home is to use cloud services, such as Google Drive, Dropbox, OneDrive, or iCloud. These services allow you to sync and store your files online, so you can access them from any device with an internet connection. You can also use cloud-based applications, such as Google Docs, Microsoft Office 365, or Adobe Creative Cloud, to work on your files without installing any software on your home computer. To use this option, you need to have a cloud account and upload your files from your work computer to the cloud service of your choice. You also need to have a web browser or a cloud app installed on your home computer.
Help others by sharing more (125 characters min.)
- Subham Limbu IT Technician
The introduction of cloud services has made our work and personal lives so much better when it comes to accessing your data and files. No matter where you are you or which device you are using, with help of cloud services you can seamlessly access your files, documents, photos etc.
LikeLike
Celebrate
Support
Love
Insightful
Funny
11
(edited)
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
- Joe de Souza Rangel TI | Analista de Infraestrutura | AZ-900✅ | SC-900✅ | SCCM / System Center | ITSM | GLPI | Microsoft 365 | Gestão de Serviços | Operações de TI | Cyber Security Analyst | Datacenter Analyst | Azure
Os usuários podem acessar os serviços em nuvem de qualquer lugar com uma conexão à internet, o que oferece maior flexibilidade e mobilidade para trabalhar remotamente. Os provedores de serviços em nuvem investem em medidas de segurança para proteger os dados dos usuários, incluindo criptografia, firewalls, detecção de intrusões e certificações de conformidade, proporcionando um ambiente seguro para armazenar e processar informações confidenciais. Os benefícios tornam os serviços em nuvem uma opção atraente para empresas de todos os tamanhos, ajudando a aumentar a eficiência operacional, reduzir custos e impulsionar a inovação.
Translated
LikeLike
Celebrate
Support
Love
Insightful
Funny
4
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
- Svyatoslav Pavlov DevOps Engineer
Leverage cloud-based solutions! Utilize cloud services such as virtual desktop infrastructure (VDI) or remote desktop services (RDS) to access your work environment securely from home. Cloud platforms offer built-in security features, including encryption, access controls, and monitoring, to safeguard your remote access sessions. ☁️🔐
LikeLike
Celebrate
Support
Love
Insightful
Funny
1
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
- Michael Sandusky Systems Support Technician
More often than not my previous gig I would have to remote into my computer at work this was established using Cisco anyconnect which established a secure connection to my work computer and Network at which point I was able to perform the remote and tasks of helping the end user.... That paired with the remote viewer of VNC viewer it was very powerful.
LikeLike
Celebrate
Support
Love
Insightful
Funny
1
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
-
Cloud storage is a great option to allow for access to files from anywhere. However, you need to also make sure you have secured access to your company's cloud.Secure password requirements are great, but MFA/2FA are a much more secure option to protect your company's files.
LikeLike
Celebrate
Support
Love
Insightful
Funny
1
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
Load more contributions
3 Remote access software
A third option to access your work computer from home is to use remote access software, such as TeamViewer, LogMeIn, or AnyDesk. These software allow you to connect to your work computer from your home computer using a secure and encrypted connection. You can view and control your work computer's desktop, applications, and settings from your home computer, as well as transfer files, chat, and collaborate. To use this option, you need to install the remote access software on both your work and home computers, and create an account or a password for the software. You also need to know your work computer's ID or hostname, and your login credentials.
Help others by sharing more (125 characters min.)
- Marcellus (I) T. Driving Excellence in Cybersecurity Practices | CompTIA CySA+🏅| Cybersecurity LinkedIn Author
To secure remote access to your work computer from home, use a Virtual Private Network (VPN) like ExpressVPN, NordVPN, or CyberGhost for encrypted internet connections. Employing Remote Desktop Protocol (RDP) with multi-factor authentication (MFA) enhances direct access security. Cloud services, including Microsoft Azure, offer secure remote desktop solutions with encryption protocols. Reliable remote access software like TeamViewer ensures a smooth connection, requiring regular updates for security. Maintain overall security by consistently updating the operating system and software, using strong passwords, and staying vigilant against phishing threats. This comprehensive approach safeguards your work environment during remote work.
LikeLike
Celebrate
Support
Love
Insightful
Funny
2
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
- Braden Hansen Director of Operations at Gant Systems
Often, your internal IT team or your outsourced IT partner already has secure remote access solutions in place. Use the same procedure that IT now uses to remotely access the particular computer rather than installing an additional remote access program. In addition to possibly removing the need for further tool purchases, this reduces the number of apps that require monitoring and upkeep. Because many free choices lack encryption and other crucial security features, using any of them could end up costing the company considerably more than any possible savings.
LikeLike
Celebrate
Support
Love
Insightful
Funny
15
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
- Evgeny Zislis Technical Director, office of the CTO at DoiT International
There are also cloud services which allow connection to devices, for example Cloudflare Tunnels. Software running on the computer allows for authenticated users to connect remotely via one of the cloud providers. This way, the computer does not need to have an open listening port on the public internet.
LikeLike
Celebrate
Support
Love
Insightful
Funny
4
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
- Murali Kempegowda Morgan Tecnica Hong Kong
The easiest and most reliable way to move to a hybrid working model without compromising security is remote desktop software. It allows workers to access their company’s systems and applications remotely and securely. However, despite the highest security standards that such software ensures, we would like to point out some precautions that are still the responsibility of the users.
LikeLike
Celebrate
Support
Love
Insightful
Funny
3
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
- Victor Nwankwo Database Administrator, IT Systems Administrator, Microsoft 365 Administrator
Consider a third approach to remotely access your work computer by employing remote access software like TeamViewer, LogMeIn, or AnyDesk. These applications enable a secure and encrypted connection, allowing you to seamlessly connect to your work computer from your home device.Effortlessly view and control your work computer's desktop, applications, and settings from the comfort of your home. These software solutions go beyond basic access, offering file transfers, chat functionalities, and collaborative features.To implement this option, install the remote access software on both your work and home computers. Create an account or set up a password within the software for added security.
LikeLike
Celebrate
Support
Love
Insightful
Funny
3
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
Load more contributions
4 Security tips
No matter which option you select to access your work computer from home, you should take some security precautions to protect your data and network. It's essential to use strong and unique passwords for your VPN, RDP, cloud, or remote access accounts and change them frequently. Additionally, two-factor authentication or multi-factor authentication should be implemented whenever possible to provide an additional layer of security. Antivirus and firewall software should be installed on both your work and home computers and kept up-to-date. Furthermore, public or unsecured Wi-Fi networks should be avoided when accessing your work computer from home as they could expose your data to malicious entities. Log out and disconnect from your work computer once you’re done, don’t leave it unlocked or unattended, and adhere to your company's policies and guidelines concerning remote access. If any suspicious activity is observed, report it immediately to the IT department.
Help others by sharing more (125 characters min.)
- Svyatoslav Pavlov DevOps Engineer
Use Strong Authentication: Implement strong authentication methods such as biometrics or hardware tokens to verify your identity before accessing work systems remotely.Keep Software Updated: Regularly update your operating system, applications, and security software to patch vulnerabilities and defend against exploits.Beware of Phishing: Exercise caution with email attachments, links, and requests for sensitive information to avoid falling victim to phishing attacks that compromise remote access credentials.Encrypt Data: Encrypt sensitive data stored on your work computer and transmitted over remote connections to prevent unauthorized access or interception.
LikeLike
Celebrate
Support
Love
Insightful
Funny
6
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
- Loveth Ayetoba Cybersecurity |Information Security |Project Management |Vulnerability management| ISO27001
In addition, remote desktop software security features must be up to date to mitigate potential vulnerabilities and minimize the risk of data breaches.
LikeLike
Celebrate
Support
Love
Insightful
Funny
3
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
- Burhan Ulu Senior IT Support Specialist
Securing your workspace is the most important task as a part of company.You must know how a malicious person harm you and make vulnerablesAs a weakest point of the ring, you need to protect your accounts with strong passwords and multi-factor authentication.
LikeLike
Celebrate
Support
Love
Insightful
Funny
3
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
- Elmer Figueroa-Garcia Committed to Making a Positive Impact
As an IT technician, I stress the importance of comprehensive security measures for remote work. Key tips include updating all software to patch vulnerabilities, using robust antivirus tools to thwart malware, and educating on phishing dangers to protect company data. I advocate for secure Wi-Fi practices, avoiding public networks without a VPN, and recommend dedicated devices for work to minimize breach risks. Additionally, regular backups are crucial for data integrity. Implementing these strategies fortifies security for remote access, safeguarding against cyber threats.
LikeLike
Celebrate
Support
Love
Insightful
Funny
1
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
- Lorenzo Marco Jose Solutions Architect | ECE, ECT, CCNA
ZTNA is a key for security. This is why 2FA (Two-Factor Authentication) is most common when accessing sensitive apps or company private networks.
LikeLike
Celebrate
Support
Love
Insightful
Funny
1
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
Load more contributions
5 Here’s what else to consider
This is a space to share examples, stories, or insights that don’t fit into any of the previous sections. What else would you like to add?
Help others by sharing more (125 characters min.)
-
- First of all identify what exactly you're trying to achieve: does your user need to access an entire desktop or just a few applications? Your user population may be a combination of both. Identify these personas and group them.- For users who need a full desktop experience, use a secure Cloud-based Desktop-as-a-Service such as Amazon WorkSpaces. - For users who just need to access a few applications, you can stream these applications to them using a secure cloud service like Amazon AppStream 2.0.- You can implement additional security measures like multi-factor authentication. Configure Group Policies on Active Directory as needed.
LikeLike
Celebrate
Support
Love
Insightful
Funny
6
(edited)
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
- Aamir Hameed Sr. IT Engineer at Saleh Al Hamad Al Mana Group of Companies, Nissan Qatar
With the current level of cloud services available, access to work computer wouldn't be required at all. But if it's really required to, always follow the company's Information Security policies. If it allows, use the organisation's approved remote connectivity/RDP applications.
LikeLike
Celebrate
Support
Love
Insightful
Funny
5
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
- Stephen Wagner Global Trusted Technology Advisor - IT Solutions - Tech Blogger - VMware vExpert, Omnissa EUC Expert, NVIDIA NGCA Advisor, VMUG Leader, Board Member @ World of EUC
VMware Horizon (or VDI as a whole), by design provides an amazing End User Experience for corporate remote access.Imagine having the same desktop everywhere, at your office, at home, remotely from a hotel, your laptop, all secured behind a reliable platform that integrates with additional security features like 2FA (whether your organization uses DUO, Azure/Entra MFA, etc).And it even supports advanced workloads that require GPUs, such as CAD, Engineering, Healthcare, and other 3D accelerated applications.The best part, all the data can stay in your organization, so you drastically reduce the risk of a breach or data theft in the event of lost or stolen devices.
LikeLike
Celebrate
Support
Love
Insightful
Funny
10
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
- Charles Belfort Analista de Suporte Sênior | Linkedin Top Voice em Suporte Técnico e Sistemas Operacionais
Para acessar meu computador de trabalho de casa com segurança, adoto medidas como o uso de uma conexão VPN para criptografar a comunicação, garantindo que dados sensíveis estejam protegidos durante a transmissão. Implemento autenticação de dois fatores para reforçar a segurança do login. Certifico-me de que meu software antivírus e todas as atualizações de segurança estejam em dia. Evito o uso de redes Wi-Fi públicas e opto por redes domésticas seguras. Além disso, considero o uso de ferramentas de acesso remoto seguras, como o Remote Desktop Protocol (RDP) com configurações adequadas de segurança.
Translated
LikeLike
Celebrate
Support
Love
Insightful
Funny
6
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
-
Ditch the open door: ZTNA locks down access, app by app. Secure your remote workforce, not the entire network.VPNs: Exposed and risky. ZTNA: Zero Trust, zero hassle. Connect directly, securely, every time.Beyond passwords and tunnels. ZTNA: Granular access, real-time control. Simplify and secure your remote future.Leaky VPNs? No thanks. ZTNA: Built for the cloud, built for security. Protect your data, empower your people.Forget the perimeter, focus on trust. ZTNA: Secure access, simplified. Access what you need, when you need it.
LikeLike
Celebrate
Support
Love
Insightful
Funny
4
- Report contribution
Thanks for letting us know! You'll no longer see this contribution
Load more contributions
Technical Support
Technical Support
+ Follow
Rate this article
We created this article with the help of AI. What do you think of it?
It’s great It’s not so great
Thanks for your feedback
Your feedback is private. Like or react to bring the conversation to your network.
Tell us more
Tell us why you didn’t like this article.
If you think something in this article goes against our Professional Community Policies, please let us know.
We appreciate you letting us know. Though we’re unable to respond directly, your feedback helps us improve this experience for everyone.
If you think this goes against our Professional Community Policies, please let us know.
More articles on Technical Support
No more previous content
- Here's how you can effectively convey project goals and timelines to your technical support team. 3 contributions
- Here's how you can showcase successful technical support projects during an interview.
- Here's how you can improve your technical support skills amidst a layoff. 4 contributions
- Here's how you can excel as a Technical Support executive: key qualities to focus on.
- Here's how you can promote self-reflection and growth through feedback in a technical support role.
- What do you do if your technical support job is demanding but you want to pursue further education?
- Here's how you can establish accountability when assigning tasks in a technical support team.
- Here's how you can enhance your technical support skills with conflict resolution training.
No more next content
Explore Other Skills
- System Administration
- Cybersecurity
- IT Management
- Software Project Management
- IT Consulting
- Search Engines
- IT Operations
- Data Management
- Information Security
- Information Technology
More relevant reading
- Computer Repair How do you remotely access and manage computers?
- Computer Networking How can you secure LANs in the age of cloud computing and remote work?
- Computer Repair How can you explain the benefits of a VPN to a remote worker?
- Technical Support How can you optimize remote computer repair tools for maximum efficiency?