BNMC Blog

Bredy Network Management Corporation (BNMC) has been serving the Northeast area since 1988. BNMC works as a strategic business partner to provide organizations with proven design, implementation and support solutions.

7 Necessities before Sending Your Workforce Remote

Due to the COVID-19 outbreak, many companies are working from home to facilitate social-distancing and keep their workforce healthy. However, it’s not as simple as sending your employees home, firing up personal laptops and getting back to work. Here are seven things you need to have lined up in order to successfully deploy your remote workforce.  

  • Secure Remote Access: Employees should not have open access to everything on their work systems from their personal computers. This keeps company data protected. In order to be productive through this pandemic, however, employers will need to provide a secure connection utilizing VPN or remote access software. These solutions will mirror the employee’s work desktop without housing all of the data on the individual’s personal system, allowing them to seamlessly continue work.
  • File Sharing Capabilities: While people will be working in isolation, they must still be able to collaborate. File sharing/group editing software will be critical to moving forward creative or documentation projects through real-time editing, commenting, and versioning. Software like Microsoft Office 365 Teams / Sharepoint,  Google G-Suite Docs or Dropbox for Business fill this need securely.
  • Enterprise Level Antivirus: Basic home-level antivirus is not sufficient, particularly in secured industries. Extend your enterprise-level antivirus to home systems that will be accessing your network to create an added layer of protection. You may also consider deploying firewalls on top of individual’s home networks to create the same secure connection employees experience in your office.
  • Video Conferencing: Meetings must go on while people work remote; however, voice-only leaves much to be desired in terms of tone and context. We highly recommend putting in place video conferencing options. You can implement something as simple as Google Duo/FaceTime, or something more feature intensive, like Zoom or GoTo Meeting.
  • Messaging Software: You can’t just spin your chair around to talk to your co-worker when working remote, yet it’s not efficient to always pick up the phone. We recommend implementing a messaging software like Microsoft Teams or Slack to open communication channels and allow employees to continue to interact quickly and accurately. Utilizing these tools, you can set up one-on-one conversations or set up channels to facilitate team communication.
  • Phone: A strong VoIP solution will allow employees to take their phone numbers remote to their cellphones without giving out their cellphone numbers. Office calls will transfer seamlessly to the employee’s cellphones, voice mails will be sent via email, and the employee can dial-out using a phone application to maintain office functionality.
  • Remote Access Policy: Prior to providing access to your employees, put in place a clear access policy that acknowledges that your company monitors whatever they do while connected. Employees should be encouraged to act as if they are on site even while working remote and reminded that punishments for doing something illegal/against company policy will apply.

The COVID-19 situation is ever-changing. Schools across the nation have been closed and events have been cancelled. While it may make sense to keep your employees on-site for now, we believe it’s important to have a plan should you need to close your physical offices. Getting these seven pieces of the puzzle in line will prepare you to take your workforce remote. For assistance implementing these things, contact us at (978) 482-2020 or Sales@bnmc.net .

0 Comments
Continue reading

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Productivity Business Computing User Tips Cloud Email Software Privacy Network Security Microsoft Hackers Workplace Tips Business Efficiency Google Hardware Data Computer Hosted Solutions Malware IT Services Internet Communication Mobile Device IT Support Smartphone Small Business Mobile Devices Android Phishing Users Cloud Computing Innovation Tech Term Data Recovery Ransomware Backup Managed IT Services Windows Smartphones Saving Money Information VoIP Quick Tips Outsourced IT Cybersecurity Disaster Recovery Upgrade Miscellaneous Passwords Network Microsoft Office Business Management communications Windows 10 Facebook Browser Data Backup Social Media Server Collaboration Office 365 Business Continuity COVID-19 Productivity Internet of Things Managed Service Managed IT Services Windows 10 Data Management Apps Gadgets Remote Monitoring Information Technology Remote Work Infrastructure Analytics Mobile Office Save Money Artificial Intelligence Gmail Word App Vulnerability Encryption Router Chrome Managed Service Provider Conferencing Money Government Spam Remote Workers WiFi Networking Holiday BYOD Paperless Office Access Control Google Drive VPN Data Security Display Applications Settings Company Culture Tip of the week Virtual Reality IT Support Employer-Employee Relationship Website Office Tips Computers Virtualization HIPAA BDR IT Management Content Filtering Bandwidth Big Data Business Technology Compliance Unified Threat Management Virtual Private Network Apple Education Storage Robot Firewall Maintenance Automation End of Support Hacker Data storage Document Management Avoiding Downtime YouTube Managed Services Employee-Employer Relationship Wireless Development Antivirus Risk Management Operating System Wi-Fi LiFi Budget Search Social Hard Disk Drive Data Breach Humor Windows 7 Hosted Solution Images 101 Best Practice Mobile Security Software as a Service Administration Laptop Retail Alert Mouse The Internet of Things Server Management Cryptocurrency Business Intelligence Touchscreen Vendor Going Green Data loss Downtime Telephone Systems Vendor Management Managed IT Cybercrime Monitors Marketing Tablet desktop Chromebook Remote How To Regulations iOS Blockchain Printing Password MSP Augmented Reality Managing Stress Two-factor Authentication Managed IT Service Remote Computing Solid State Drive Customer Relationship Management Scam IT Outlook SaaS Computing Identity Theft Social Network OneNote Free Resource Bring Your Own Device Break Fix Training Buisness Automobile Mobility Screen Reader Batteries Charging Black Friday G Suite Smart Office Employees Co-Managed IT Holidays Wires Servers Google Calendar Typing Virtual Desktop Dell Dark Data Update Licensing Dongle Banking Emergency Sports Onboarding Distribution GDPR Solar Network Management Cabling Assessment Procedure Managed Services Provider Dark Web Current Events WannaCry Google Maps Politics Print Toner Smart Tech Myths Cyber Monday Slack Hard Disk Drives Work Gig Economy Work/Life Balance Content Payment Card Huawei Voice over Internet Protocol Legislation Customer Service Cooperation Messaging Service Level Agreement Reviews Digital Signage Logistics Data Warehouse SharePoint Google Docs Health Private Cloud Hotspot Entertainment Internet Exlporer PCI DSS Microsoft Excel IT solutions Office Samsung Techology Tech Support Shortcuts Connectivity Mobile Management Smart Technology Hacks Monitoring IT Technicians Solid State Drives Optimization FBI Google Wallet Digital Payment Streaming Modem Inventory Processor FinTech Statistics Bitcoin Staff Employee-Employer Relationships Leominster Lenovo Troubleshooting Asset Management Business Analysis Downloads Business Growth Meetings Disaster Language Value Battery Hybrid Cloud Mail Merge Digital Social Engineering Recycling K-12 Education VoIP Unified Threat Management Legal Websites Security Cameras IoT Peripheral Profiles Shortcut Distributed Denial of Service Twitter Spying Mirgation National Security Unified Communications Drones Human Error Cookies Shadow IT Memory Bluetooth Comparison Windows 8 Analysis Students K-12 Schools user treats Firefox Superfish Social Networking Memes Virus Uninterrupted Power Supply Computing Infrastructure Scalability Professional Services Files Address Permissions Halloween Spyware Safety Chatbots Updates eWaste Instant Messaging User Error Deep Learning File Sharing Star Wars Management Utility Computing Patch Management Mobile Device Management Computer Care IBM Device Nanotechnology Gamification Reducing Cost Specifications Network Congestion Wearable Technology Mixed Reality Network upgrade Shopping LED Motherboard Threats Cables Heating/Cooling Multi-Factor Security Alt Codes Alerts Migration USB RMM Consulting Scary Stories PowerPoint Identity Continuity Time Management Printer Fraud Laptops Cost Management Policy Running Cable Corporate Profile Writing Unsupported Software Supercomputer CrashOverride Financial Motion Sickness Computer Repair Relocation Staffing Administrator Mobile Data Regulation Taxes IT Budget How To Web Server what was your? Recovery GPS IT Consultant Black Market Law Enforcement Cameras Electronic Medical Records Tracking Notifications Physical Security Cleaning Upgrades Gadget CCTV Emoji Crowdsourcing Printers Webcam Personal Information Botnet Error 3D Printing Cortana Point of Sale Ben McDonald shares Travel Machine Learning Mobile Computing Processors

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3