Don’t Let Your Job Ruin Thanksgiving!!


November 25, 2015

Why would your boss call on Thanksgiving!! Or in your case, is it a client?  Either way, they want this file, and it is at the office, and to get it, you are going to have to leave the great table set before you and head out to the office on a holiday.

But you work for a client supported by Integris! You don’t have to go!  Integris provides two ways to connect to your PC at work from home. VPN and LogMeIn.

VPN is a secure tunnel through the internet from your PC to the office network. Using a VPN you can connect and download files easily. You can’t run a lot of programs over a VPN however.

For that, we have LogMeIn, a tool that allows you to remote control your PC at work. With that tool, many aplications can be run remotely, which cannot be run over a VPN.

These are complimentary resources to you because you are a client of Integris.  Setting up these two tools and running them is complimentary with your management contract.

Simply talk to your Boss or your Security Officer, and get approval to work remotely, then Integris will set this up for you and support you using it, even on Thanksgiving!!

We're Integris. We're always working to empower people through technology.

Keep reading

How the Best IT Companies in Minnesota Support the Hybrid Workforce

How the Best IT Companies in Minnesota Support the Hybrid Workforce

After the initial shutdowns and stay-at-home orders lifted following COVID-19, workers throughout the United States and Minnesota decided that the work-from-home model was here to stay. It makes sense -- working from home offers a lot of convenience to your team – and...

Do I Need To Improve My Endpoint Protection?

Do I Need To Improve My Endpoint Protection?

A compromised endpoint gives hackers everything they need to get a foothold in your security network. Once there, they can steal data and potentially hold it for ransom. That’s why it’s so important for business owners to secure their critical endpoints (including...

Multi-Factor Authentication

Multi-Factor Authentication

Granting access to information is a necessity, as is security for both the user needing access and for the information for which access is being granted. The best way to handle this is by establishing user accounts for users. This does several things at once: Allows...