Categories
Remote access Smartwatch

TeamViewer Remote Access and Support Enables Health Point … – PR Newswire

Health Point Neurodiagnostics uses TeamViewer’s remote connectivity platform to monitor mobile devices and data

TAMPA BAY, Fla., Sept. 27, 2022 /PRNewswire/ — Health Point Neurodiagnostics, a premier remote diagnostic test provider, is using TeamViewer to increase the reliability and quality of their remote EEG ambulatory mobile testing. Thanks to TeamViewer’s secure Remote Access and Support solution, Health Point Neurodiagnostics technicians can conduct intermittent monitoring every two hours to ensure the EEG records and video data quality is as expected.

As a fully HIPPA compliant solution provider, TeamViewer enables Health Point technicians to spot an issue with the data, and notify the appropriate personnel needed to restore the data stream. This removes the need for regular in-person checks and greatly reduces the possibility of an unsuccessful test. The regular check-ins help to ensure the data stands up to audits, providing tangible results that the service they provide is meeting particular specifications.

To date, Health Point Neurodiagnostics has easily passed every audit conducted while using the TeamViewer software and connection reporting system.

“It’s vital for us to ensure the reliability and quality of our EEG devices for our patients,” says Kris Raymer, Chief Technology Officer at Health Point Neurodiagnostics. “TeamViewer has allowed us to remotely monitor our devices and troubleshoot any issues that arise. They have become a necessity in mobile neurodiagnostics, and we couldn’t do what we do today without them.”

“TeamViewer is excited to see our solutions being used in such an important and critical industry,” said Patty Nagle, President, Americas at TeamViewer. “We understand how crucial reliability and quality are for the health care industry and are proud to team with Health Point Neurodiagnostics to help remotely monitor their patients.”

Health Point Neurodiagnostics has increased the number of patients that can be served at any given time, improving health outcomes from around 100 to 200 patients per month. As a result, the company continues to expand, growing its workforce and creating more jobs throughout the country.

Read more about the use of TeamViewer Remote Access and Support at Health Point Neurodiagnostics in the case study.

About TeamViewer

TeamViewer is a leading global technology company that provides a connectivity platform to remotely access, control, manage, monitor, and repair devices of any kind – from laptops and mobile phones to industrial machines and robots. Although TeamViewer is free of charge for private use, it has more than 620,000 subscribers and enables companies of all sizes and from all industries to digitize their business-critical processes through seamless connectivity. Against the backdrop of global megatrends like device proliferation, automation and new work, TeamViewer proactively shapes digital transformation and continuously innovates in the fields of Augmented Reality, Internet of Things and Artificial Intelligence. Since the company’s foundation in 2005, TeamViewer’s software has been installed on more than 2.5 billion devices around the world. The company is headquartered in Goppingen, Germany, and employs around 1,400 people globally. In 2021, TeamViewer achieved billings of EUR 548 million. TeamViewer AG (TMV) is listed at Frankfurt Stock Exchange and belongs to the MDAX. Further information can be found at www.teamviewer.com.

Contact TeamViewer

Press
Michael Kornspan
Phone: 727-910-7340
E-Mail: [email protected]

SOURCE TeamViewer

Categories
Remote access Smartwatch

Malicious ‘Cloud9’ Chrome extension operates like a remote access … – SC Media

A Chrome extension dubbed “Cloud9” has been observed stealing session information and then installing malware to assume control of the device, according to Zimperium zLabs. (Photo by Justin Sullivan/Getty Images)

Editor’s note: This story was updated Nov. 11 with comments from a Google spokesperson, who replied after initial publication.

Researchers reported discovering a malicious Chrome browser extension — dubbed “Cloud9” by the author — that steals the information available during a browser session and then installs malware to assume control of the entire device.

In a Tuesday blog post, the Zimperium zLabs team explained that Cloud9 behaves like a remote access trojan (RAT) and performs at least 10 different types of malicious activities, including cookie stealing, keylogging, Layer 4/Layer 7 hybrid attacks, and OS and browser detection for next stage payloads.

The researchers also said the malware originated from the Keksec malware group, which was originally formed in 2016 by botnet actors. This group has been best known for its DDoS, mining-based malware and botnets.

What’s most troubling about this malware is its ability to avoid existing endpoint detection systems, said Bud Broomhead, chief executive officer at Viakoo. Broomhead said this reinforces that threat actors are aiming to avoid traditional security solutions, in this case existing endpoint malware detection systems.

“It’s similar to how threat actors have been targeting IoT/OT systems, which are not supported by traditional IT security solutions,” said Broomhead. “Many browsers are used as interfaces to OT equipment, specifically to access consoles that manage and control these systems. This could be a path for IoT/OT devices being exploited.”

John Bambenek, principal threat hunter at Netenrich, added that this malware primarily uses older browser vulnerabilities, so security teams should keep browsers patched and updated.

“That being said, any functionality or extension added into the browser or config changes can have profound security implications,” Bambenek said. “The browser config should be tightly controlled and only allow specific browser extensions to be installed.” 

Matthew Fulmer, manager of cyber intelligence engineering at Deep Instinct, called Cloud9 “a relatively nasty RAT” which, aside from using cycles on a machine to mine crypto, can deliver second-stage malware. Fulmer said it’s unique in the way it could be included as a part of a malicious executable, but also run as a standalone, delivered-to-machine via remote and executed.

“The second part is the most dangerous and plays on something widely talked about in the security world — clicking on suspicious links,” Fulmer said. “All that’s needed is the malicious javascript file to be embedded on a site with scripting hooks, and you could easily weaponize any site you like. What if someone gained access to a large search engine like Google and embedded the script at the very end of the page, how many people could they impact and how wide of a net could they cast on gaining access to environments by harvesting credentials?”

A spokesperson for Google noted that the malicious extension was not available in the tech giant’s official store, adding: “We always recommend users update to the latest version of Google Chrome to ensure they have the most up-to-date security protections. Users can also stay better protected from malicious executables and websites by enabling Enhanced Protection in the privacy and security settings in Chrome. Enhanced Protection automatically warns you about potentially risky sites and downloads and inspects the safety of your downloads and warns you when a file may be dangerous.”

Categories
Remote access Smartwatch

Democrats continuing Legislature remote access case despite U.S. … – New Hampshire Bulletin

The U.S. Supreme Court on Tuesday declined to hear an appeal in a lawsuit by New Hampshire House Democrats seeking remote participation in the state Legislature, dealing the effort a major setback. But Democrats say they’re not finished litigating.

In March, the First Circuit Court of Appeals in Boston ruled against the Democrats’ effort; the Supreme Court’s denial of the attempt to appeal means that ruling now stands. 

But Democrats say the circuit court ruled only on their request for a preliminary injunction, a common initial step in a lawsuit. With the appeals for that motion now exhausted, the party has returned to federal court in Concord to attempt to enter into a full civil trial. 

“The state is taking the position that essentially all the issues have been decided, there’s nothing else, there’s no other grounds for us to move forward,” said Israel Piedra, a Democratic state representative from Manchester and an attorney representing Democrats in the case. “And we obviously disagree.” 

The Democratic plaintiffs, who include current House Democratic Leader David Cote, are asking the court to force the New Hampshire House to allow House lawmakers to vote remotely on session days, arguing that the decision to require in-person meetings during the COVID-19 pandemic had prevented immunocompromised members from voting. 

The plaintiffs formerly included Reps. Renny Cushing and Katherine Rogers, both of whom had cancer and died in the past year. Cote has cerebral palsy and suffered a heart attack in 2018.

This time around, Democrats are tweaking their strategy. In its final ruling in March, the circuit court held that it could not grant Democrats’ motion against Republican Speaker Sherman Packard because Packard had legislative immunity. Democrats had argued that they were in fact suing the state, not Packard personally, but the “en banc” panel of circuit court judges had disagreed. 

Now, in their second attempt before the U.S. District Court in Concord, Democrats are attempting to more explicitly direct their lawsuit against the state. They’re naming the state as one of the defendants and are also including House Clerk Paul Smith as a defendant, arguing that he does not benefit from the same legislative immunity. 

“The court determined that no, we hadn’t sued the state, even though I really strongly disagree with that decision,” Piedra said. “So now we are explicitly suing the state.”

The state has filed a motion to dismiss in the renewed lawsuit in district court. The Democratic lawmakers now have until the end of the month to file a response to that motion. The court will then schedule oral arguments on whether to dismiss the case. 

For the Democrats, the effort still faces an uphill battle. The district court already ruled against Democrats, holding that legislative immunity applied to Packard. During oral arguments, the district court judge suggested that their case would be hampered by legislative immunity even if they made clear they were attempting to sue the state and not a specific lawmaker, Piedra said. 

And while an initial, three-judge panel of the circuit court did rule to allow Democrats’ injunction last year, that holding was ultimately overturned by the full, five-member en banc panel. That reality could make victory difficult if the plaintiffs took the current case to appeal.

But Piedra argued that the change in focus to suing the state and not the House speaker could help produce a different outcome. Because they are no longer seeking a preliminary injunction, plaintiffs have a slightly lower bar this time; they no longer need to prove they will suffer irreparable harm if the court does not act immediately. And Piedra noted that the en banc circuit court decision was not unanimous and that some judges dissented. 

Given the continuing efforts, Republicans stopped short of claiming victory after the Supreme Court rejection.

“Speaker Packard is reviewing the latest details of this ongoing litigation case with his legal team,” the speaker’s office said in a statement Wednesday. 

Categories
Remote access Smartwatch

The importance of remote access to value-based care – from home … – go.beckershospitalreview.com

Health organizations across the United States are starting to develop value-based care models as they work towards providing higher-quality care for their patients. With the right tools, remote care can enable health organizations to provide even more access to care at home and in the community. This webinar will discuss how remote primary care can impact value-based programs, increase top-line revenue, and improve performance and quality indicators.

Attendees will learn about:

Categories
Remote access Smartwatch

Malicious ‘Cloud9’ Chrome extension operates like a remote access … – SC Media

A Chrome extension dubbed “Cloud9” has been observed stealing session information and then installing malware to assume control of the device, according to Zimperium zLabs. (Photo by Justin Sullivan/Getty Images)

Editor’s note: This story was updated Nov. 11 with comments from a Google spokesperson, who replied after initial publication.

Researchers reported discovering a malicious Chrome browser extension — dubbed “Cloud9” by the author — that steals the information available during a browser session and then installs malware to assume control of the entire device.

In a Tuesday blog post, the Zimperium zLabs team explained that Cloud9 behaves like a remote access trojan (RAT) and performs at least 10 different types of malicious activities, including cookie stealing, keylogging, Layer 4/Layer 7 hybrid attacks, and OS and browser detection for next stage payloads.

The researchers also said the malware originated from the Keksec malware group, which was originally formed in 2016 by botnet actors. This group has been best known for its DDoS, mining-based malware and botnets.

What’s most troubling about this malware is its ability to avoid existing endpoint detection systems, said Bud Broomhead, chief executive officer at Viakoo. Broomhead said this reinforces that threat actors are aiming to avoid traditional security solutions, in this case existing endpoint malware detection systems.

“It’s similar to how threat actors have been targeting IoT/OT systems, which are not supported by traditional IT security solutions,” said Broomhead. “Many browsers are used as interfaces to OT equipment, specifically to access consoles that manage and control these systems. This could be a path for IoT/OT devices being exploited.”

John Bambenek, principal threat hunter at Netenrich, added that this malware primarily uses older browser vulnerabilities, so security teams should keep browsers patched and updated.

“That being said, any functionality or extension added into the browser or config changes can have profound security implications,” Bambenek said. “The browser config should be tightly controlled and only allow specific browser extensions to be installed.” 

Matthew Fulmer, manager of cyber intelligence engineering at Deep Instinct, called Cloud9 “a relatively nasty RAT” which, aside from using cycles on a machine to mine crypto, can deliver second-stage malware. Fulmer said it’s unique in the way it could be included as a part of a malicious executable, but also run as a standalone, delivered-to-machine via remote and executed.

“The second part is the most dangerous and plays on something widely talked about in the security world — clicking on suspicious links,” Fulmer said. “All that’s needed is the malicious javascript file to be embedded on a site with scripting hooks, and you could easily weaponize any site you like. What if someone gained access to a large search engine like Google and embedded the script at the very end of the page, how many people could they impact and how wide of a net could they cast on gaining access to environments by harvesting credentials?”

A spokesperson for Google noted that the malicious extension was not available in the tech giant’s official store, adding: “We always recommend users update to the latest version of Google Chrome to ensure they have the most up-to-date security protections. Users can also stay better protected from malicious executables and websites by enabling Enhanced Protection in the privacy and security settings in Chrome. Enhanced Protection automatically warns you about potentially risky sites and downloads and inspects the safety of your downloads and warns you when a file may be dangerous.”

Categories
Remote access Smartwatch

Supermicro Announces JumpStart Early Remote Access Program … – HPCwire

Checking if the site connection is secure



Enable JavaScript and cookies to continue

www.hpcwire.com needs to review the security of your connection before proceeding.

Categories
Remote access Smartwatch

Secured Remote Access Market 2021 Growth Drivers and Future Outlook | Top Brands BeyondTrust AT&T Delin… – costaricapages.com

The global market Global Secured Remote Access Market study gives a comprehensive analysis of the industry, including essentials such as the industry chain’s structure and implementations. In addition, the study evaluates all industries in various geographical regions and provides a cross-sectional analysis of global economic demand estimations. The Secured Remote Access market’s complexities and flaws are intrinsic, but the benefits and hazards are external. The subsections of this research report can be utilized to investigate the significance of a variety of factors. To help consumers better understand their competitors’ plans, the global Secured Remote Access study report focuses on mining crucial investment mechanism data, leading industry suppliers, and growth opportunities.

Key Players in the Secured Remote Access market:

BeyondTrust
AT&T
Delinea
F5
ManageEngine
Vmware
Hysolate
Duo
GoTo
NordLayer
Axis
Moxa
Zscaler
Citrix
Thales
Redcentric
Splashtop
OTORIO
CentreStack

Request a sample report : https://www.orbisresearch.com/contacts/request-sample/6877819

The global market share analysis provides information on foreign economies, including development patterns, positive environmental assessments, and the field’s fastest-growing regions. Regulation and implementation strategies are examined, as well as an examination of production processes and pricing procedures. The study evaluates the present state of the global keyword market as well as potential growth prospects during the projected period. Recent developments, partnerships, SWOT analyses, joint ventures, major financial results, and an overview of leading market competitors are all covered in this report. The industry study also includes Secured Remote Access information on market rivalry, such as fusions, acquisitions, and market growth ambitions.

Secured Remote Access Market Types:

technology
Single Sign-On (SSO)
Virtual Private Network (VPN)
Zero Trust Network Access (ZTNA)
Network Access Control (NAC)

Secured Remote Access Market Applications:

Communications Industry
Other

Purchase the report at

Throughout the forecast period, the Secured Remote Access market research report includes data on market share in terms of industry growth potential, value and volume, and vital company features. A variety of preparations and preparation processes are also included in the Secured Remote Access report. The Secured Remote Access evaluation includes crucial variables such as leading manufacturers, growth rate, production value, and key geographies. We built a detailed and extensive business environment, as well as a commodity supply for the leading suppliers in various geographical regions, to provide clients of this study a precise image of the global Secured Remote Access market.

The study covers the most recent keyword market forecasts for the foreseeable future. The market analysis looks at past and future industry dynamics, organizational infrastructure, international risks, and end-users. In-depth information on forthcoming technologies, R&D attempts, and new product development is included in the Secured Remote Access market analysis report. 

The study covers the most recent keyword market forecasts for the foreseeable future. PESTEL and SWOT business surveys were analyzed as part of the investigation. The prognosis and market projection for the global Secured Remote Access market study give an assessment of recent industry demand by end-user and type category.

Do Inquiry before Accessing Report at: https://www.orbisresearch.com/contacts/enquiry-before-buying/6877819

About Us:

Orbis Research (orbisresearch.com) is a single point aid for all your market research requirements. We have a vast database of reports from leading publishers and authors across the globe. We specialize in delivering customized reports as per the requirements of our clients. We have complete information about our publishers and hence are sure about the accuracy of the industries and verticals of their specialization. This helps our clients to map their needs and we produce the perfect required market research study for our clients.

Contact Us:

Hector Costello
Senior Manager – Client Engagements
4144N Central Expressway,
Suite 600, Dallas,
Texas – 75204, U.S.A.
Phone No.: USA: +1 (972)-362-8199 | IND: +91 895 659 5155
Email ID: [email protected]

Categories
Remote access Smartwatch

What Is Remote Access and How Does It Work? – Security Boulevard

Remote access eliminates the need for users to be present in the office to access a network or file or for IT technicians to add new systems to the company network. It allows employees to work from anywhere and enables IT staff to monitor and manage endpoints remotely.

This blog explains how remote access works, the different ways to carry it out, the benefits, importance and more.

What is remote access? 

In its most basic form, remote access is the ability to connect to a computer or network in one location from another place. This can be done in several ways, including via the internet, through a virtual private network (VPN) or by using specialized software, such as a remote monitoring and management (RMM) tool that allows one computer to control another.

IT technicians or employees no longer need to be present on-site to provide or receive IT support. A technician can remotely connect and support a device using remote access tools and technologies. In our post-pandemic world, where hybrid work is taking center stage, remote access makes it easy for employees to work from home or anywhere in the world. You can be out of town and still be able to manage your business without a hitch.

What is an example of remote access? 

An example of remote access is when you use a computer, smartphone or tablet to connect to another computer or network from a different location.

There are several everyday scenarios in which remote access comes into play. For example, if you need to access files on your work computer from home, you will use remote access to do so. Similarly, if technicians need to troubleshoot an issue on an employee’s computer, who is working remotely, they would also use remote access.

In both these cases and many others, remote access provides a convenient way to get the information, software or help to do your job without being physically present in the office.

What is the difference between remote access and remote control?     

Remote access allows you to access files and applications on another person’s computer without taking control of it. This is useful for people who need to work remotely, such as remote workers or people who travel frequently.

Remote control, on the other hand, allows you to take control of another person’s computer from your own computer. This is often used by IT support professionals to troubleshoot problems on someone else’s computer.

How does remote access work? 

As already stated, remote access is the ability to access a computer or network remotely. There are many different ways to do this, but they all involve using some kind of protocols, tools, software and connections.

The most common way to get remote access is by using a virtual private network (VPN). VPNs are commonly used in businesses so that employees can access company resources from their homes or while on the road.

Another common way to provide remote access is via remote desktop protocol (RDP), a proprietary protocol developed by Microsoft that works with Mac operating systems as well. IT professionals use RDP to share data between connected computers or troubleshoot problems on other computers. Furthermore, RDP encrypts the data before transmitting it, making it a secure way to share information over public networks.

You can also use SSH (Secure Shell) to securely connect to another computer and transfer files back and forth.

Many tools and services also enable users to access files remotely on other computers. These include solutions like Dropbox, Google Drive and Microsoft OneDrive. 

What are the different types of remote access methods? 

There are broadly three types of remote access methods: direct, indirect and VPN. 

Direct remote access is the most common and simplest type of remote access. It involves using a computer or other device to connect directly to another computer or device over the internet.

Indirect remote access usually requires some intermediary server, such as a web-based email service, to relay messages between two computers or devices.

VPNs create a secure, private connection between two computers or devices over the internet.

The following are some common methods of remote access:

  • Point-to-Point Protocol (PPP): PPP is a TCP/IP protocol used to connect two computer systems over a telephone network or the internet. It is a data link layer communication protocol that connects two routers directly without using a host or any other networking protocol. It can authenticate loop connections, encrypt transmissions and compress data.
  • Point-to-Point Protocol over Ethernet (PPPoE): PPPoE is a combination of PPP and the Ethernet link-layer protocol that connects users to a network of hosts via a bridge or access concentrator. It encapsulates and transports IP packets over an Ethernet link using PPP.
  • Serial Line Internet Protocol (SLIP): SLIP is a simple protocol that communicates over serial ports and routers using TCP/IP, enabling communication between machines that were previously configured to communicate directly with one another.
  • Point-to-Point Tunneling Protocol (PPTP): PPTP is a networking protocol used to connect to VPNs. People who want to connect to a network in a different location than they are in use this protocol. 
  • Layer Two Tunneling Protocol (L2TP): Also known as virtual lines, L2TP connections enable corporate networks to manage IP addresses assigned to remote users. As a result, remote users can access corporate networks at a low cost. L2TP has two tunnel modes. The voluntary tunnel terminates at the remote client, whereas the mandatory tunnel terminates at the internet service provider (ISP).
  • Remote Desktop Protocol (RDP): RDP is used to access a desktop computer remotely. Remote desktop users can operate their work system remotely (e.g., to edit or create files) and run applications just like they would if they were in front of their computer.
  • Remote Access Services (RAS): RAS acts as a gateway or a server to let users connect to a company’s internal local area network (LAN) remotely.
  • Remote Authentication Dial-In User Service (RADIUS): RADIUS provides centralized authentication, authorization and accounting AAA management services for remote access users in a distributed dial-up network.
  • Terminal Access Controller Access Control System (TACACS): TACACS is an authentication protocol that allows remote communication with UNIX server. 
  • Internet Protocol Security (IPsec): IPsec creates encrypted connections between devices and ensures the security of data transmitted over public networks. 

What is the most common form of remote access? 

A VPN is the most common way to securely connect to a private network over the internet. VPN allows you to access resources on the private network as if you were physically connected to it. Businesses commonly use VPNs to allow employees to access corporate resources remotely. Individuals also use them to securely connect to public Wi-Fi networks and protect their privacy while online.

Using an endpoint management tool, you can create scripts to set up VPNs that provide secure access to your office environment for remote workers. Not only that, but it also makes VPN access easy for end users. Once VPN clients are installed on all of your remote endpoints, you can monitor those clients in your endpoint management tool to ensure they are up and running. If the client goes down, you can also auto-remediate the issue by restarting the VPN client via policy-guided scripts.

Why is remote access important? 

In an increasingly mobile and connected world, remote access is more important than ever. It allows employees to work from anywhere, at any time, using any device. It also provides a way for businesses to connect with customers and partners in real time, regardless of location.

There are many benefits of remote access, but the following are the most noteworthy:

  • Increased productivity: Employees can work from anywhere, anytime, using any device. This flexibility can lead to higher productivity since employees can better manage their time and work around personal commitments.
  • Improved collaboration: Remote access allows team members to collaborate in real time, regardless of location. It helps enhance communication and teamwork.
  • Lower costs: Businesses can reduce office space and equipment costs when employees can work remotely. Additionally, businesses can reduce travel costs by conducting meetings and conferences online. In addition, remote access supports bring your own device (BYOD) practice, so employers don’t need to invest heavily in buying computers for new employees.
  • Enhanced security: When properly implemented, remote access improves security since it allows for better early detection and remediation of potential cybersecurity breaches. Additionally, data can be stored remotely off-site, reducing disaster-related data loss risks.

What are some benefits of remote access? 

With remote access, you can keep your business running smoothly no matter the economic environment. It also keeps you up and running when a natural disaster like a hurricane or a pandemic strikes and threatens business continuity.

Most MSPs understand how hard it is to keep up with their clients’ ever-changing requirements. With seamless remote access, MSPs can check in on their clients’ endpoints from anywhere at any time. Additionally, remotely providing services to clients reduces costs and ensures continuity of service, improving client satisfaction. Clients are more likely to recommend MSPs with a faster response time than their peers.

For internal IT teams, uninterrupted IT service enhances employee satisfaction, contributing to higher productivity and lower employee turnover. Additionally, remote access helps companies reduce operational costs associated with the on-site management of employees and helps IT teams decrease ticket response times, thus minimizing downtime. Employees can easily share knowledge to complete projects and access cutting-edge technologies for improved productivity.

A common concern among MSPs and internal IT teams is ensuring security when employees and clients work remotely. The ability to monitor and patch vulnerabilities remotely allows technicians to ensure the security of networks and devices, basically the IT infrastructure in general.

What is remote access software? 

Remote access software lets you access your device remotely without physically being able to see it. When you remote into a device, you can see the screen, access the files and use the software on the machine just like you would if you were there in person.

Remote monitoring and management (RMM) software is a must-have tool for any enterprise with a fleet of managed devices. These solutions let companies keep tabs on their own and their clients’ network, check uptime and performance and generally stay on top of things constantly.

An RMM tool is also helpful for managing remote access to your network from the outside through an extended VPN or Remote Access Management system. These tools can help you filter which users have remote access privileges and track device usage so that you know who has access to which data and when.

Users can gain remote access to your company’s network through several different channels — an on-premises VPN, an internet-based VPN (also called a cloud VPN), a SaaS app, etc. Whatever kind of external remote access you set up requires management and tracking to ensure optimal security and performance levels.

Utilize remote access with Kaseya VSA 

VSA is the only tool you need to manage your endpoints remotely. Through LiveConnect, you can monitor, control and troubleshoot your endpoints from anywhere, at any time, without disturbing the user. You can remote control any device, including PC, Mac, Linux, switches, servers, network devices, printers and more. You can also execute automated agent procedures directly through remote control.

It is impossible to discuss all the benefits of VSA’s remote access functionality in this article. Experience is the best way to understand it. Schedule a demo of VSA today and discover how easy it is to control your dispersed workforce and IT environment.

Schedule a VSA Demo 

The post What Is Remote Access and How Does It Work? appeared first on Kaseya.

*** This is a Security Bloggers Network syndicated blog from Blog – Kaseya authored by Kaseya. Read the original post at: https://www.kaseya.com/blog/2022/11/25/remote-access/

Categories
Remote access

Pakistan: Introducing Remote Access to Medicine and Health – Lexology

The Sindh Telemedicine and Telehealth Act 2021 (the Act) is a first-of-its-kind, which aims to facilitate and improve access to healthcare through distant platforms and to counteract the shortage of both healthcare professionals and facilities in the province of Sindh.

The Act defines “telehealth” and “telemedicine” broadly, to include the provision of medical care and patient education, as well as health information services and self-care via telecommunication or digital communication technologies. The provision of services is enabled through secure two-way audio or video connections or video conferencing, use of storage and forward technology, electronic media or other forms of telecommunication technology. Although artificial intelligence is highly unrecognized and underdeveloped in Pakistan, the Act conceives the use of online adaptive interviews and remote patient monitoring devices for the exchange of diagnostic, treatment and prevention information, along with the research and evaluation of these communications.

In order to ensure regulatory oversight, the Act requires that practitioners (RMPs) be registered with the Pakistan Medical and Dental Council and presently restricts access to patients within the limits of the Sindh province. As such, practitioners’ profiles and verified registration status are made transparent to consenting patients. The RMPs are also obligated to make professional judgments as to whether an in-person consult would be preferable in each case, keeping the patient’s interest and the complexity of the patients’ condition paramount. For this purpose, RMPs must consider the mode/technologies available to them and their adequacy for diagnosis, before choosing to proceed with any form of health education, counselling or medication. Additionally, due recognition has been given to the patient’s right to confidentiality of information. The Act provides that no data or information shall be shared without the consent of the patient or authorized caregiver, prescribing penalties for breach.

With the inception of the Act, the need for remote access to and delivery of medical and healthcare services was tested through its implementation during the COVID-19 pandemic. Again, with the recent and unprecedented calamity of floods in the Sindh province, the Government of Sindh has aimed to set up a tele-mental health centre at the largest public hospital in Karachi (Jinnah Post Graduate Medical Centre). Two pilot projects are also in the works to serve the severely affected Dadu and Kambar-Shahadkot districts.

Significantly, the Act brings within its ambit, medical consultants and practitioners from outside of Pakistan. While this effort certainly widens the potential for a higher standard and quality of healthcare to the inhabitants of Sindh, the potential for enforcement in cases of negligence or misconduct committed by practitioners offering services from abroad, is at best very limited. The intention to regulate cross-border interactions at a provincial level is also open to debate, given that healthcare is a jurisdictional realm over which the Federal Government of Pakistan has the Constitutional mandate to exercise authority.

From the patient’s perspective, there also exists some room for improvement. For instance, in cases where a patient requires urgent or emergency medical care, telemedicine – which only has remote access to such patient – may delay efficient delivery of treatment. While the benefits of technological intervention cannot be undermined, the administration of medical care through in-person diagnoses may prove more comprehensive and reliable. To address such concerns, the Government of Sindh may consider complementing its initiative with introducing telehealth medicine centres in each district of the Province of Sindh with on-duty practitioners.

All in all, the Act has enabled patients to benefit through a regulated telehealth service, ensuring a wider patient base …….

Source: https://news.google.com/__i/rss/rd/articles/CBMiU2h0dHBzOi8vd3d3LmxleG9sb2d5LmNvbS9saWJyYXJ5L2RldGFpbC5hc3B4P2c9N2U4NmQxNTUtYzdhYS00ZjJiLWFmNzYtMmYzNzIzMTFkZjYy0gEA?oc=5

Categories
Remote access Smartwatch

Inovato Quadra Review, Part 5: Remote Access (or Not!) – Virtualization Review


Inovato Quadra Review, Part 5: Remote Access (or Not!)

Over the span of four previous articles, I’ve taken a close look at the Inovato Quadra, a low-cost ($29) alternative to the Raspberry Pi (RPi). In this article, I will test a use case for the Quadra that is not among those listed on Inovato’s web site — accessing remote virtual and physical desktops. To attempt this, I will see if I can install an RDP and Horizon client on it.

RDP Client
RDP is perhaps the most common method to connect to a remote Windows computer. There are clients for all of the major OSes, and all modern Windows systems come with an RDP one.

Linux has many different RDP clients, but I will be installing one that I have used and found very flexible in the past, Remmina, a very powerful tool that allows you to connect to other remote systems over various protocols such as SSH, VNC, FTP and, of course, RDP. I installed it by entering apt install remmina.

[Click on image for larger view.]

By default, Remmina only comes with SSH for connections and requires plugins for other remote protocols. I installed the RDP plug-in by entering apt install remmina-plugin-rdp. After doing this, I was able to connect to a Windows 10 system using RDP flawlessly from the Quadra.

[Click on image for larger view.]

Sharing Your Desktop
Once I found that I could access Windows systems from the Quadra, I wanted to see if I could allow remote access to my system. There are various methods and tools available to access Linux desktops remotely. Being that Linux was designed from the ground up to be a multi-user OS, you can access a new desktop or share an existing one on a system that a user has already logged in to. The most popular way to do this is by using VNC. There are many different VNC clients and servers, each with its own benefits and drawbacks.

To minimize issues, I will share my desktop — as opposed to having a new desktop created remotely — by using a VNC package called Vino. Instead of creating a new desktop session, Vino mirrors what is being displayed on the main session. To install Vino, I entered apt install vino.

Vino comes with a tool called gsettings to adjust its settings. To make things as straightforward as possible, I disabled all user confirmation, encryption and password requirements. I then started the server by entering:


gsettings set org.gnome.Vino prompt-enabled false
gsettings set org.gnome.Vino require-encryption false
gsettings set org.gnome.Vino authentication-methods “[‘none’]”
/usr/lib/vino/vino-server

From my laptop, I launched VNC Viewer for Google Chrome.

[Click on image for larger view.]

I entered the Quadra device’s IP address and was notified that I was going to have an unencrypted session.

[Click on image for larger view.]

After I selected Connect, it displayed the Quadra desktop that I was logged onto.

[Click on image for larger view.]

While the interactivity on the VNC screen was not as snappy as on the physical system, it was still usable.

I monitored the system while I was connected to it. During this time, I saw its CPU usage go up to 100 percent, with Firefox processes taking 33 percent, web content taking 27 percent and Vino taking 14 percent of the CPU cycles, respectively.

[Click on image for larger view.]

After a few minutes, the system overheated and shut down.

[Click on image for larger view.]

I proceeded to reset the device, restart the Vino server and connect to the system. I then monitored the system while working on a LibreOffice Writer document over the VNC connection. The CPU usage stayed below 6 percent, and the temperature stayed below 161 degrees. Upon reviewing the running processes, I saw that Vino was using 1 percent of the CPU cycles.

[Click on image for larger view.]

Attempting to Install the Horizon Client
VMware does have a Horizon client for ARM processors, which appears to have once been supported on generic ARM devices, but VMware now only supports it on ThinLinx Operating System (TLXOS) or Stratodesk NoTouch Operating System ARM systems. That said, other VMware products have been known to run on unsupported hardware, so I decided to attempt installing it on this device.

To download the Horizon client, I launched Firefox and navigated to: http://www.vmware.com/go/viewclients. Then, under VMware Horizon Client for Linux, I clicked VMware Horizon Client for 64-bit Linux.

[Click on image for larger view.]

I selected 2206.1 from the Version drop-down menu and downloaded it. Then, I opened a terminal and installed the Horizon client by entering:


cd ~/Downloads ## Change to the current user’s Download directory
chmod 755 VMware-Horizon-Client* ## Make the file executable
./ VMware-Horizon-Client-2106.1-8.3.1-18435609.x64.bundle –console

The –console switch allowed me to install from the command line rather than within the GUI interface.

When I entered /usr/bin/vmware-view, I got a message that some libraries were missing, including libcairo-gobject and libgtmkmm.

[Click on image for larger view.]

I tried various methods to get the Horizon client to install and run, but I gave up after a couple hours.

Summary
I was able to use the Quadra to connect to a Windows system using RDP and was also able to connect to it using Vino and VNC. While I did encounter some heat issues when running Vino with Firefox also running on the device, I didn’t experience this issue when editing documents and found the Vino-server process CPU usage to be negligible.

In this series of articles, I’ve used the Inovato Quadra for its intended purposes and then attempted to push the device beyond those limits. I didn’t have any issues when using the device for what it was designed for, but sometimes when I pushed the device beyond that level it did occasionally overheat. However, the folks at Inovato stated that they were working on a fan for the device, which may help alleviate some of these heat issues.

For under $30, the Quadra is all-in-all quite a capable little device and I would highly recommend it to anyone looking for a low-cost, yet fairly powerful computer to experiment with or to use as a lightweight home system. If you are looking to use it as a production edge computing device, I would suggest making sure that your applications will not over-stress the CPU or overheat it.

About the Author


Tom Fenton has a wealth of hands-on IT experience gained over the past 25 years in a variety of technologies, with the past 15 years focusing on virtualization and storage. He currently works as a Technical Marketing Manager for ControlUp. He previously worked at VMware as a Senior Course Developer, Solutions Engineer, and in the Competitive Marketing group. He has also worked as a Senior Validation Engineer with The Taneja Group, where he headed the Validation Service Lab and was instrumental in starting up its vSphere Virtual Volumes practice. He’s on Twitter @vDoppler.