As a small business ourselves, we hope that the information we have used to build and execute our Remote Work & Business Continuity Plan can help accelerate how your business can address these issues to keep your team and our community safe through this unprecedented time.

In an effort to provide you and your staff the capability to continue business operations in a remote setting, while also maintaining a secure working environment, we have developed the following solution sets.  While some of these solutions are not ideal, we feel that they balance the need to implement quickly, while maintaining your network’s security.

Option 1

User’s Company Issued Computer is a Laptop  

Many company laptops are already designed to have remote access abilities.  If your staff have company issued and Cervisys managed laptops, AND you already have VPN or a Remote Desktop Server (RDS) configured, you may just need to assess licenses and resources to support your team. Whether or not you need to make any further investments will vary depending on the solution.

Option 2

User’s Company Issued Computer is a Workstation/Desktop 

If you have users who have a workstation or desktop computer, we have developed and tested a solution to allow your users to remotely control a workstation at the office.  Using this secure, remote access solution, the user’s workstation/desktop can be accessed via a personal computer they may have at home.

Either of these options will provide you with a quick AND secure solution to allow your staff to work remotely. If you feel that there is a user with more complex requirements, please read through Evaluating Applications for Remote Work.  We understand the that the current extraordinary circumstances require extraordinary actions, and Cervisys is working to do our part to keep you, our client, safe.

In an effort to provide you and your staff the capability to continue business operations in a remote setting, while also maintaining a secure working environment, we have developed the following solution sets.  While some of these solutions are not ideal, we feel that they balance the need to implement quickly, while maintaining your network’s security.