Skip to main content

Ensure Productivity and Security When Employees Must Work from Home


By Rita Selvaggi, CEO of ActivTrak

The global reach of the coronavirus has elevated the discussion around the need for “social distancing” and working remotely to avoid spreading the infectious virus. Global companies like IBM, Goldman Sachs, and PwC are asking employees to work from home, as are smaller organisations, such as Seattle-based online payment company Stripe.
As organisations consider having employees work from home on a more massive scale, it’s important to recognise that doing so also introduces certain risks to the business that must be mitigated. In this article, I’d like to cover three remote workforce-related risks: employee productivity, digital security, and compliance.

Not Every Employee is Productive at Home

A traditional work environment provides employees focus, stimulus, and engagement intended to optimise workplace productivity. So, it’s no surprise that some employees simply aren’t wired to work by themselves at home; with no co-workers or meetings, and plenty of distractions, the potential for lower productivity at home is significant. According to a study by Buffer, a lack of collaboration, loneliness, and motivation are challenges for those who work remotely.
So, how do you ensure employees deliver office-equivalent productivity levels?
A few actions may be necessary:
  • Set the Expectation – For some employees, setting expectations around working hours and productivity levels may be initially necessary. For instance, establishing that employees should plan to be working normal business hours when at home is a solid starting point. Additionally, hourly employees may need to be informed on how to keep track of their time – whether done manually or via a web-based time card application. Lastly, it makes sense for the organisation to communicate what the employee should do when they believe themselves to have become ill.
  • Embrace the Digital Workplace – Software vendors such as Microsoft and Google have spent years building out cost-effective solutions that allow users to communicate, collaborate, video conference, share documents, and use virtual desktops. When asking employees to work from home, it’s important to evaluate how more consistent use of  these types of solutions can help preserve productivity and engagement across teams.
  • Gain Visibility into Employee Productivity – In a traditional office setting it’s much easier to tell if an employee is working than when they are 30 miles away at home. But,  it still can be a challenge to establish productivity baselines and identify when and where productivity is lost, even if the employee works onsite.   Organisations should consider solutions that provide visibility and insight into whether employees are engaged and productive, regardless of their location.
Even if productivity isn’t a concern, the organisation does take on an added security risk with the introduction of a much broader remote access footprint.

Digital Security Becomes a Bigger Issue

While the vast majority of remote workers want to work from home (84%, according to Buffer), 37% of remote workers would pick a coffee shop as their second choice of work location. As humans, we need to connect, so finding a way to work while feeling a part of the world is still  important. Giving employees the flexibility to work in various remote environments may be the key to ensuring productivity, and even retention in some cases.
When employees work outside the safety net of the corporate network, it opens the organisation up to devices and WiFi networks that are potentially insecure – as well as users who no longer think they are “at work”. This combination of lowered defences is a perfect storm for cyberattacks that prey on unsuspecting employees. Using social engineering techniques, hackers can trick workers into giving up corporate credentials to online resources, install malware, commit fraud, and more.
Then how do you maintain security while working remotely?
Maintaining appropriate levels of security is a challenge with an anytime/anywhere/any device/any network-type of employee. The good news is there are things you can do, including:
  • Establish Shared Responsibility – It’s important to communicate that the employee has a role in ensuring the ongoing security of the organisation’s operations, data, and resources. A vigilant mindset is required, as cybercriminals watch industry trends and devise new scams and social engineering methods that continuously adapt to evolving circumstances.
  • Implement Layered Security – Solutions such as multi-factor authentication (to make certain the person using a logon ID and password is the owner of those credentials), Single Sign-On (to give employees a single web-based portal to access applications securely), device-based antivirus, email-based scanning (to spot malware-laden attachments and links before they reach the employee’s Inbox), and are just a few of the ways organisations can protect themselves against remote-work threats.
  • Monitor for Anomalous Behaviour – In a recent Verizon study, 39% of organisations had experienced an attack on mobile devices in the last 12 months. Solutions that provide visibility into employee productivity should have some means of also analysing user activity to identify suspicious or anomalous behaviours. For example, an employee logging on to a system at 3am (something they never do) may be cause for review to ensure the activity is appropriate.
And, because security is a concern, the risk of not being compliant with regulations around data privacy should also be in focus.

Keeping Remote Employees – and the Organisation – Happy, Productive, and Secure

In the case of a potential pandemic like the coronavirus, the easy part may be the decision to have employees work from home. The real challenge begins as organizations strive to achieve the same levels of efficiency, productivity, and profitability that they do “at work”. By considering the real-world implications of working from home through the lens of employee productivity, digital security, and compliance, organisations can set themselves up for success, despite the shift in how the company operates.

Comments

Popular posts from this blog

दुनिया की सबसे ज्यादा उपयोग होने वाली वेबसाइट

आज मैंने आप लोगो के लिए बहुत ही अच्छा डाटा बेस तैयार किया है | इस डाटा बेस से आप लोगो को बहुत हे ज्यादा लाभ होगा , क्युकी इसमे सौ से ज्यादा वेबसाइट का नाम है और उसके सामने उसका लिंक भी दिया गया है | अगर आप लोगो को यहाँ डाटा बेस अच्छा लगे तो अपने दोस्तों के साथ जरूर शेयर करे |इसमे मैंने आप के यूज़ मे आने वाली बहुत सारी वेबसाइट का नाम है | उम्मीद है आप लोगो को यह जरूर पसंद आएगा ||| . How to simultaneously videos to YouTube – tubemogul.com . How to share you email address online without worrying about spam – scr.im . How to check font name of any image- myfonts.com/WhatTheFont . Best Collection of Open source fonts- google.com/webfonts . How to find data hidden in your photographs – regex.info . How to set broadcast events live over the web, including your desktop screen – livestream.com . How to search all your domain – iwantmyname.com . How to design from scratch or re-model your home in 3d- homestyler.com . How to share all your screen with anyon...

SAY NO TO SHYNESS !!!

13 Confident Ways to Overcome Your Shyness Those who have never suffered from shyness have no idea how debilitating it can be, especially for someone in a professional situation. If shyness is holding you back, learn how to get past it and become more confident. Shyness can truly hold people back --partly because those who are shy tend to avoid public situations and speaking up, and partly because they experience so much chronic anxiety. ⁣⁣ If that's you, take comfort in knowing you are far from alone--four out of 10 people consider themselves shy. But here's the good news: Shyness can be overcome. With time and effort and a desire to change, it's possible to break through. If your shyness is severe, you may need help from a therapist or counselor, but most people can overcome it on their own. Take your first steps in getting past shyness with these 13 techniques to help you become a more confident you. 1. Don't tell. There's no need to advertise your shyness. T...

MOST COMMON CYBER ATTACKS

1). PHISHING:        • One of the most insidious techniques used today is Phishing. It's hard to find the person that doesn't know what phishing is. However lot of users still getting tricked by the hackers.         • Phishing implies    the replication of the website with the aim of stealing money or personal information. And once a user enters his credit card details in that fake website, a hacker can get access to those details and will be able to use those information for his own benefit. 2). Viruses and Malicious Codes:        • Hacker's can almost crawl into any website and leave in its database malware or insert code into website files.         • There is a huge variety of viruses, and each may impact the infected websites differently. 3). UI Redress:        • This technique is similar to the phising; but in this case a hacker could create a fake hidden user int...