ProSoft Insights / Work Smarter

Security Considerations for Remote Access – from Home Offices

Search Insights




Yes, I would like to receive marketing information from ProSoft Technology, Inc., and its affiliates, subsidiary companies and brands indicated below.

I therefore provide my consent to the use of the personal information submitted here for the purpose of providing me marketing information related to ProSoft Technology, Inc. and its affiliates’ and subsidiaries’ products, services and marketing events. I understand that I may withdraw my consent at any time. Additional information regarding ProSoft’s data privacy policies, including how to withdraw this consent, is available at ProSoft Technology, Inc. is a subsidiary of Belden Inc., and their affiliates, subsidiary companies and brands include ProSoft Technology SAS, ProLinx Comunicacao Industria, LTDA; Global Blue Networks Inc., and ProSoft Technology (Asia Pacific) SDN BHD.

Recent Posts

Explore Your Options for Edge Connectivity

22 九月, 2023 / Technology focus

As the need to collect and analyze data grows for most industrial facilities, you may b...

Have Leftover OpEx Dollars? Consider Your Modernization Needs (and Risk Factors)

31 八月, 2023 / Work Smarter

Have some OpEx budget to use by the end of the year? Consider what might be needed to u...

Consider the Benefits: Streamlined J1939 Connectivity

09 八月, 2023 / Product focus

The J1939 standard protocol can help identify issues within large vehicles. Find out ho...

Video: Your Guide to Ethernet Messaging Types

20 七月, 2023 / Videos

Most industrial automation protocols have two methods of communication – client-server ...

Security Considerations for Remote Access – from Home Offices

Depending on your location, the recommendation for remote work – when possible – is still in place. While working from home (WFH) isn’t an option for all employees, companies around the world have embraced the option to protect their workers and families during the pandemic.

One option for industrial applications is the ability to monitor and troubleshoot equipment from home. Read on for some security considerations to keep in mind for remote access to your operation.

Secure remote access – right from your home office

With a cloud-based remote connectivity service, your employees can monitor and troubleshoot equipment, whether it’s in your facility or among multiple sites. Doing so securely is possible – here are a few factors to keep in mind when researching solutions:

∙ Avoid software, embrace Single Sign-On: Having software to install or update doesn’t only take valuable time – it can also be an entry point for potential hackers. Instead, opt for a service that’s securely updated for you. In addition, Single Sign-On support can be a helpful feature. SSO allows your employees to access several of your applications with one set of login info. This is managed by your IT department. From a WFH standpoint, this also means that if an employee suddenly needs to switch to remote work, access to your remote access system can be more easily – and quickly – granted.

∙ One-time use connections and token-based two-factor authentication: Besides the use of SSO, there are other ways to help ensure access of your equipment is as secure as possible. In Belden Horizon, for example, one-time use connections terminate when work is completed, an added level of protection for employees monitoring equipment from home, or outside vendors. Token-based two-factor authentication can also be a stronger security measure than a method involving automated text messages.

∙ Virtual Lockout-Tagout: Sure, there’s the 5-second commute, but working from home has meant less communication for some employees. When working on-site, you might be more likely to hear when you should (or shouldn’t) access equipment. A virtual lockout-tagout feature can let you grant timed access of your equipment to certain users in your remote access service. An audit trail can help you see permissions that were granted. This is also helpful when you need to grant permissions to outside vendors: You can control their access to your equipment while ensuring that everyone stays safe while work is performed.

Learn more about secure remote connectivity solutions.