LUTZ BUSINESS INSIGHTS

 

5 Technology Tips for Working Remote

5 TECHNOLOGY TIPS FOR WORKING REMOTE

neil wardyn, VIRTUAL CHIEF TECHNOLOGY OFFICER & business development manager

 

The impact of COVID-19 has been felt all over the world. To keep businesses running, most companies have implemented the capabilities for users to work remotely. This has allowed businesses to function still while the offices remain empty. As we slowly start to move back to our pre-COVID-19 lifestyles, the capability to work remotely will continue to be available and most likely used more frequently. Here are some considerations as our workforce continues to be one that is mobile.

1. Security

  • Patching
    • Make sure that your service provider has a plan in place to apply critical patches to remote systems. Not applying these patches could leave the system vulnerable to attacks.
  • Anti-Virus and Malware Protection
    • Any remote system should be running a Next-Generation Antivirus that uses a combination of AI, behavior detection, and machine learning to help detect and anticipate unknown treats along with catching known threats.
  •  VPN
    • A Virtual Private Network (VPN) provides a secure encrypted connection for the remote system to communicate to the company’s private network. This protects your sensitive data and allows you to access information inside the private network.
  • Disk Encryption
    • With the increase of mobile devices, comes the increased possibility that these devices can be stolen or lost. Disk Encryption locks down the hard drive to make sure someone cannot hack into your device.
  • Multi-Factor Authentication
    • Multi-Factor Authentication (MFA) requires multiple credentials to allow access to an application. For example, when you log in to a program, you will also be sent a code to your mobile phone that you must enter before you are granted entry. This can help prevent access to your information if your password is compromised. It can also prevent access from brute force attacks and phishing attempts. 

2. Environment

  • Equipment
    • To work effectively from home, you should have a similar environment to what you have in the office. This includes your monitors, keyboard, mouse, comfortable chair, etc.
  • Dedicated Work Area
    • Make sure that you have a dedicated area. This will allow you to stay focused and effectively communicate with coworkers during phone calls and video meetings. 
  • Reliable Bandwidth
    • Home internet will be essential, so having a reliable Internet Service Provider (ISP) is critical.
  • Type of Computer
    • As workers continue to become more mobile, businesses need to evaluate if a laptop or desktop makes more sense. Is the remote worker using a personal computer at home? Remote workers should not be using personal devices for business purposes.

3. Communication

  • Tools
    • Applications like Microsoft Teams, Zoom, Cisco Webex, GoToMeeting, LogMeIn, Intermedia, and Google Hangouts allow you to stay easily connected.
  • VoIP Softphones
    • These programs enable you to make calls from your computer. You need a VoIP service to use these applications.
  • File Sharing
    • Using tools like Google Drive, Microsoft Office 365 (Teams, SharePoint, OneDrive), OneHub, or Dropbox allows you to share documents through the cloud easily. Some of these applications also allow multiple users to be editing the document at the same time.

4. Cloud Computing

  • Moving internal software to cloud-based solutions provides a variety of benefits, a few of which include:
    • Savings on capital costs since physical hardware will no longer need to be refreshed
    • Keeps you running on the latest version of the software with most recent enhancements
    • The worry of power outages, ISP outages, and disasters at the office does not affect cloud-hosted applications
    • Hosted applications can usually be accessed from a variety of devices

5. Support

  • Shadow IT
    • Shadow IT is the use of technology systems, software, or applications that are not administered by the organization’s IT department. With people working remotely, the risk for Shadow IT increases.
    • Unsupported apps, or even worse, malicious apps, could be installed and create serious security risks
  • Make sure all users have access to contact information for your managed service provider.

The way we work is changing, and how we respond to these adaptations is critical for continued success. By implementing these technology tips, your company can begin to operate more efficiently and securely. Contact Lutz Tech today to learn more about our technology solutions.

ABOUT THE AUTHOR

308.382.7850

nwardyn@lutz.us

LINKEDIN

3320 JAMES ROAD

SUITE 100

GRAND ISLAND, NE 68803

NEIL WARDYN + VIRTUAL CHIEF TECHNOLOGY OFFICER & BUSINESS DEVELOPMENT MANAGER

Neil Wardyn is a Virtual Chief Technology Officer & Business Development Manager at Lutz Tech with over 17 years of IT experience. He is responsible for architecting short-term and long-term technology plans and strategies for potential clients. In addition, he will provide support in resolving technology-related issues.

AREAS OF FOCUS
AFFILIATIONS AND CREDENTIALS
  • Oracle Certified Associate
EDUCATIONAL BACKGROUND
  • BA in Computer Science, Hastings College, Hastings, NE
COMMUNITY SERVICE
  • Grand Island Leadership Tomorrow, Board of Directors
  • Central Community College,  IT Advisory Committee
  • IT Pathway, Advisory Committee
  • Skills USA, Contest Coordinator
  • Youth Sports Coach

SIGN UP FOR OUR NEWSLETTERS!

We tap into the vast knowledge and experience within our organization to provide you with monthly content on topics and ideas that drive and challenge your company every day.

About UsOur Team | Events | Careers | Locations

Toll-Free: 866.577.0780Privacy Policy | All Content © Lutz & Company, PC 2021

0
0
0
0
0