Virtual desktops to the rescue
What if desktops have become compromised? Recovery times can take a lot of time to complete, especially in the case of laptops that travel with their users to different locations. Recovery tasks may include the following steps:
- Gain access to the device. The user might need to bring the device to the IT department.
- Clean the device of any malware using an antivirus solution.
- Reinstall the device.
These steps are time-consuming but not a big problem when only one or a couple of desktops need to be cleaned or reinstalled. But what happens when malware has spread throughout a lot of desktops, rendering most or all useless?
One big advantage of services such as Windows 365 and Azure Virtual Desktop is that companies can spin up large amounts of desktops that the workforce can use to sign into and resume their work. Both solutions are very flexible and scalable, giving a company the choice to either keep the virtual desktop or return...