What is background access and how does it differ from unattended access?

Any organization will need computers to get work done, and there is a continuous drive to have more software to enhance and streamline business operations. It is not unusual for each worker to have multiple devices, including desktop PC’s (opens in new tab)laptops, tablets and smartphones (opens in new tab). The challenge is thereby created to keep all of these devices fully updated – at all times – to maintain optimal function. After all, there is a time factor as updates need to be done ASAP, especially when there is a zero day exploit, but it is impossible to update every device simultaneously.

One approach has been remote support where a technician in a remote location is then allowed to work on the computer’s software via the internet. This is a powerful technology that can get a computer’s problem addressed without having to bring the computer in, or having anyone come to the place of business. However, there are two downsides to this. The first is that it is disruptive to have the tech controlling the computer, as the user is not able to use the computer at the same time as the remote support person takes control of the mouse and keyboard. The other issue is that it can be a potential security hazard as the tech gains access to the entire computer so the vendor needs to be chosen carefully with a good reputation.

Leave a Comment