Author Archive

Thinking about going remote-first, forever? Do these 5 things beforehand

Jeff Technology, Trends January 4, 2021

In recent years, flexible working has become synonymous with modern business management and a distinctive trademark for hip tech companies.

 

However, since COVID, it has become vital for most companies to adapt their work settings to social distance practices and to strive for a higher degree of digitalization. 

 

In a matter of months, telecommuting, remote working, teleworking, working from home, working from anywhere, and flexible workplace have entered our vocabulary – and are very likely here to stay.

 

As we witness this epochal transition, employers and employees wonder, how should we come prepared to meet the inevitable challenges? Here is a to-do-list for all the companies that are considering going remote-first!

 

Organize the tools, systems, workflows

If you are approaching remote working for the first time, you should consider yourself very lucky! The technology that is available on software and on cloud nowadays is (in most cases) sufficient for you and your employers to keep constantly in touch and organize your streams of work in the most efficient way. So much so that several companies will never go back to now obsolete in-office work arrangements.

 

Examples of online tools that can make your work-from-home life easier include (among many others): video cloud-based communication software programmes, time and tasks management apps, corporate training platforms, cybersecurity toolkits.

 

Also, here you can find EU-startups-approved lists of AR and VR startups that are helping us work remotely and of several tools for jazzing up your online and work meetings.

 

Assign clear roles and responsibilities

Another important step to make remote working ‘work’ is to set clear roles and responsibilities among your co-workers or employees. As mentioned before, the appropriate online tools and a constant flow of communication between team members can help everyone understand what’s expected of them within the group. 

 

A fixed hierarchy and clear tasks are particularly important in a remote working situation as they encourage your employees to take ownership for their work and their success (and, very importantly, to acknowledge their shortcomings).

 

Also setting up clear goals and KPI’s is important for a group that works from different places – and sometimes on a different schedule or even a different time zone. Check the next item on the list for advice on how to set KPI’s from a distance.

 

Review KPIs

Whatever the working arrangement, monitoring performances and detecting areas for improvement is key to success. In a remote working scenario, setting KPI’s becomes all the more important to measure whether your collective efforts are effectively being carried out.

 

Some simple advice for carrying out a performance assessment for out-of-office work includes: 

  • Tracking milestones in relation to the final product (or intermediate versions) with an Agile Project Management process framework
  • Keep a steady flow of information by sharing feedback and notes
  • Use virtual boards and keep them updated, that should help keep you workers motivated

 

Ultimately, your employees should feel comforted by the fact that the workflow remains unaffected.

 

Start building a positive working culture

Positive attitude in the workplace is everything! Make sure to outline the advantages of a remote position to your employees. Remote working needs some adjustments but should never feel like a demotion or a punishment. Instead, it holds tangible advantages: when employees can manage their time autonomously, you reduce the risk of them contracting the virus, and they feel safer, more motivated and trusted.

 

Also, set out values that are important for both parties, such as defining free time slots, and prioritizing employees’ mental and physical needs. During quarantine and social distancing times, feelings of isolation and distress are very common. That is why building an effective and positive working culture includes finding the right work/life balance.

 

Check-in with your employees

Make your employees feel heard and seen – even if only via a computer screen! Make a habit of getting regular, virtual coffee breaks with them and meetings that aren’t strictly work-related.

 

Trust them with their tasks and make sure that they feel safe while performing their duties. Losing one’s job is a dreadful fear and can impact their performances. Plus, it can worsen an already aggravated mental state. It is in fact proven that a high level of economic anxiety has been generally registered during the pandemic. And this is not only true for people who are unemployed but also for those who are employed and in fear of being laid of.

 

We’re Elixis Technology

In the ever-changing, technology-centric world we live in, it’s vital to have an I.T. solution source you can count on. At Elixis Technology, it is our mission to help businesses — big and small — produce the results their customers demand, with technology that actually works.

.

News Source: https://www.wired.co.uk/

These cybersecurity tactics will help businesses survive 2021

Jeff Technology, Trends January 4, 2021

Security professionals take three steps: threat detection, immediate action and long-term defence. All companies should look to do the same, no matter their industry.

 

During 2020, institutions of all kinds were forced to adapt to a dynamic world where the usual projections and five-year marketing plans did not apply. Economic reports show marked GDP reductions of greater than 20 per cent in many countries, with a continued decline into 2021. Businesses and workplaces will increasingly turn to models of work in dynamic fields – such as cybersecurity – to make them more resilient.

 

Organisations that emerge out of the pandemic and the ensuing economic turmoil will have spent 2020 continually adapting to previously unimagined circumstances. This is a very familiar environment for people working in security, and particularly cybersecurity because quite often we don’t know what the next couple of hours will look like. Businesses of all kinds will discover the need to adopt fluid models and frameworks developed in a dynamic field and use them to redirect money, personnel and resources rapidly.

Typically, most businesses rely on static, predictive data analysis for growth and sustainability. The study insights and information from the previous few weeks and base predictions on them. However, these statistics can be rendered virtually useless within the next hour. Instead, businesses must start using data as they get it, proactively seeking out problems that could pose danger – just as cybersecurity specialists do.

 

Many cybersecurity frameworks can be modified to suit businesses more broadly. One example is data orchestration – where information that has been siloed in various parts of an organisation is collated and made available for rapid analysis.

 

Another is the concept of common vulnerability exposures (CVEs). This is a standardised identifier for known vulnerabilities, such as a weakness in a certain kind of encryption or exposure such as a large data breach in the last two years. Lists of these are available for any organisation looking to improve its cybersecurity. A version of this approach for other industries – known issues with certain suppliers, for example – could be used to make all kinds of firms more resilient.

 

In cybersecurity, we often take a three-pronged approach: detect what the potential threat is; take immediate action to protect information; and establish long-term defences to systems, such as new kinds of encryption. Businesses will find that adopting these processes and tools – especially their emphasis on the early detection of potential threats and the sharing of information when necessary – will help future-proof operations.

Early adopters will be the winners here. Workplaces and organisations that embrace the reality of a dynamic environment, rather than yearning for static working and legacy business models, will outperform their competitors. In 2021, companies and institutions that adopt principles such as data orchestration and CVEs, will find they’re in a better position to survive.

 

We’re Elixis Technology

In the ever-changing, technology-centric world we live in, it’s vital to have an I.T. solution source you can count on. At Elixis Technology, it is our mission to help businesses — big and small — produce the results their customers demand, with technology that actually works.

.

News Source: https://www.wired.co.uk/

Microsoft Set to Block SolarWinds Orion Binaries

Jeff Technology, Trends December 16, 2020

 

Microsoft is preparing to quarantine malicious versions of the SolarWinds Orion application used in recent nation state attacks, in a move that may crash systems.

 

The computing giant had previously released detections to alert customers of its Windows Defender security product if they were running the malicious updates. Although it was recommended that such customers isolate and investigate any such devices, the decision was down to them.

 

However, in an update yesterday Microsoft effectively said it was taking the decision out of the hands of its customers.

 

“Starting on Wednesday, December 16 at 8:00 AM PST, Microsoft Defender Antivirus will begin blocking the known malicious SolarWinds binaries,” it said.

 

“This will quarantine the binary even if the process is running. We also realize this is a server product running in customer environments, so it may not be simple to remove the product from service.”

 

Over the weekend reports emerged that a previous attack on FireEye was part of a much larger Russian intelligence plot to steal sensitive information from US government and countless other unnamed organizations.

 

The vector was Orion updates which the attackers managed to seed with malicious binaries used to install the Sunburst (aka Solarigate) backdoor malware. SolarWinds confirmed to the SEC that 18,000 customers were affected.

 

However, as the product performs crucial network management operations, Microsoft’s decision could theoretically cause some disruption.

 

“It is important to understand that these binaries represent a significant threat to customer environments,” it argued. “Customers should consider any device with the binary as compromised and should already be investigating devices with this alert.”

 

Microsoft urged victim organizations to immediately isolate affected devices, identify accounts used on the device and assume they have been compromised, reset passwords, look for lateral movement tools and more.

 

We’re Elixis Technology

In the ever-changing, technology-centric world we live in, it’s vital to have an I.T. solution source you can count on. At Elixis Technology, it is our mission to help businesses — big and small — produce the results their customers demand, with technology that actually works.

.

News Source: https://www.infosecurity-magazine.com/

Twitter Fined Half a Million Dollars for Privacy Violation

Jeff Technology, Trends December 16, 2020

Twitter has been fined over half a million dollars for violating European Union data protection laws in the first EU-wide privacy case. 

 

The EU’s chief data watchdog today announced that it has issued an administrative fine of 450,000 euros ($547,000) to the social media titan for being too slow to notify Android phone users located across the EU of a data breach that threatened their privacy.

 

A further finding of the investigation into the breach by Ireland’s Data Protection Commission (DPC) was that Twitter failed to adequately document the security incident. 

 

The DPC’s investigation into the incident commenced in January 2019 following receipt of a breach notification from Twitter. On Tuesday, the DPC stated that Twitter “infringed Article 33(1) and 33(5) of the General Data Protection Regulation (GDPR) in terms of a failure to notify the breach on time to the DPC and a failure to adequately document the breach.” 

 

Under EU data protection rules, it is a requirement to report a breach within 72 hours of discovery. 

 

The commission described the not insignificant financial penalty levied on the American company as “an effective, proportionate and dissuasive measure.”

 

According to the Binding Decision of the Board, the data breach arose from a bug in Twitter’s design that caused the protected tweets of Android device users to become unprotected without their consent if users changed the email address associated with their Twitter account. 

 

The bug, which affected 88,726 EU and EEA users between September 2017 and January 2019, was traced back to a code change made on November 4, 2014. It was discovered on December 26, 2018, by the external contractor managing Twitter’s bug bounty program.

 

Referencing the significance of the Twitter inquiry, the DPC stated: “The draft decision in this inquiry, having been submitted to other Concerned Supervisory Authorities under Article 60 of the GDPR in May of this year, was the first one to go through the Article 65 (‘dispute resolution’) process since the introduction of the GDPR and was the first Draft Decision in a ‘big tech’ case on which all EU supervisory authorities were consulted as Concerned Supervisory Authorities.”

 

We’re Elixis Technology

In the ever-changing, technology-centric world we live in, it’s vital to have an I.T. solution source you can count on. At Elixis Technology, it is our mission to help businesses — big and small — produce the results their customers demand, with technology that actually works.

.

News Source: https://www.infosecurity-magazine.com/

Web app attacks are up 800% compared to 2019

Jeff Technology, Trends December 7, 2020

Report finds many attacks focus on companies least impacted by COVID-19 outbreak

Web application attacks have increased by over 800%, according to the State of the Web Security for H1 2020 report.

Published by CDN and cloud security provider CDNetworks, the report found that during the first half of this year, web application attacks, which use malformed requests or injected payloads to steal data, modify data or obtain privileges illicitly, increased nine times relative to H1 2019.

CDNetworks saw and blocked over 4.2 billion web application attacks during H1 2020.

The statistic show that web application attacks in the public sector surpassed attacks in retail venues, making the public sector the single most attacked industry during this period

“In fact, over 1 billion of the web attacks were targeted toward the public sector, which accounts for 26% of total attacks,” the report says. “Equally disturbing is the fact that with artificial intelligence (AI) becoming a vital part of cybersecurity, hackers are now using machine learning to detect and crack vulnerabilities in networks and systems.”

The company collected anonymized data from its clients and said the statistics showed enterprises are “experiencing challenging times in their attempts to defend against cyber attacks and protect their online assets.”

The report also found that DDoS attack incidents saw over a 147% year-on-year growth as of H1 2020. This increase peaked in February and March and remained at elevated levels. Similarly, attack peaks more than doubled in H1 2019 compared to H1 2020. The study found the most prevalent DDoS attacks were SYN flood at 53% and UDP flood at 35%. ACK flood and ICMP flood attacks were significantly lower at 8% and 4%, respectively

According to the report, bot attacks nearly doubled in 2020 with 10.38 billion bot attacks blocked by the firm. CDNetworks said this figure was 97% higher than H1 2019. On average, CDNetworks blocked 660 bot attack incidents, nearly doubling H1 2019.

Bot attacks relate directly to economic trends. In previous years, bot attacks focused on tourism and related industries, such as transportation and hospitality. But COVID-19’s impact on tourism and hospitality, online services, e-commerce and gaming are now bot attacks’ primary targets.

The report added that hackers are extremely sensitive to industry transformations and switch their attack tools and methods to keep pace with these changes.

“Nowhere is this more evident than with the Covid pandemic, where a decline in the tourism industry has prompted attackers to move toward exploiting online learning, telecommuting, and other businesses that are flourishing during the current pandemic,” the report’s authors said.

 

We’re Elixis Technology

In the ever-changing, technology-centric world we live in, it’s vital to have an I.T. solution source you can count on. At Elixis Technology, it is our mission to help businesses — big and small — produce the results their customers demand, with technology that actually works.

.

News Source: https://www.itpro.co.uk

Are you getting the most out of Microsoft Teams?

Jeff Technology, Trends December 7, 2020

Whether or not you made the journey back to the office during the relative relaxation of restrictions during the summer months, we’re all working from home again now.

 

The difference between the last lockdown and this one is that this time we know the drill. Charities have had time to find out what works for them and what doesn’t and to build digital processes with an eye towards longer-term sustainability.

 

According to a recent survey, more than 74% of organisations are planning to permanently shift to a more remote way of working, with 83% of employees stating that they would like to continue to work from home at least occasionally.

 

It’s arrived sooner than many of us hoped, but we now have the opportunity to fine-tune our digital systems, and to make sure that our operations are optimised for maximum efficiency.

 

Microsoft Teams has been a constant companion for many of us during 2020. As organisations prepare to move services back online, at least for the remainder of the month, we examine how charities can get the most out of their subscription. If you’re new to the platform, you can learn the basics here, before coming back to learn about these more advanced features.

 

Get Set Up With Bots

Teams is a great way to stay in touch with your colleagues. But if you’re part of a larger organisation, or even just one with a lot of group chats, the incessant pinging can get to you.

 

If you come back to your laptop after lunch to find you’re swamped with notifications, it can be stressful having to sort through them all and worrying you might have missed something vital.

 

Luckily, Teams comes equipped with a solution: an array of fully-integrated bots!

 

The handy little helpers can help automate a number of simple tasks, saving you time and cutting down on admin. Check out this list of some of the most popular bots to get you started. Or, if you’re in the market for something a little more bespoke, Microsoft offers guidance on setting up your own.

 

Search For Files

One of Teams’ most appealing features is the quick and easy file-sharing.

 

But if you and your colleagues are sending files back and forth all day, it can be easy to lose track of who, what, where and when (and maybe even why).

 

Not to worry – locating any missing files is simple. In any conversation or channel, you have two options. You can click the ‘files’ tab to see a dropdown list of files shared in that channel. Alternatively, you can enter a keyword in the search field, and find select files quickly.

 

Searching private channels can be a bit more complex. Because each private channel has its own SharePoint, separate from the parent team site, files shared a private channel are managed independently.

 

Teams doesn’t support this manner of content search for a single channel. This means that the whole parent team must be searched. To perform a content search of a private channel, search across the team, the site collection associated with the private channel (to include files), and mailboxes of private channel members (to include messages).

 

This can be a tricky process. Luckily, Microsoft offers clear and actionable guidance on the subject.

 

Get Secure With Mobile Device Management and MFA

Because so many Teams users find the platform intuitive and simple to grasp, we can often use it very casually. It is common to disclose important information with colleagues over Teams. We can do so safe in the knowledge that Microsoft’s market-leading security is keeping sensitive data safe.

 

But any security system is only as strong as its weakest link. A lost or stolen device can lead to a data breach with serious consequences.

 

Think for a moment about the messages you have sent via Teams over the past few days. Consider any personal or sensitive conversations you might have had, as well as any vital organisational files you might have shared. Would you feel comfortable with this information finding its way into the hands of cyber criminals?

 

If not, then you might want to take advantage of Microsoft 365’s security features – specifically, Mobile Device Management (MDM) and Multi-Factor Authentication (MFA).

 

Microsoft 365 offers a simple MDM system. This allows admins to create and deploy a number of security policies to help secure your data from threats. For example, you can set a policy so that a device will lock after a set time of inactivity, or after multiple sign-in failures.

Microsoft 365 also offers the capability to remotely wipe corporate data from a device. This has both its pluses and its minuses. It will ensure the security of your data. However, it is best used as a last resort, as this action will wipe everything on the device.

 

For more advanced MDM functionality, Microsoft Intune Device Management Platform offers enterprise level security.

 

Break Down Barriers With Together Mode

Together Mode is a popular recent additions to Teams’ features. You may have seen it across various social media platforms or in memes over the last few months.

 

This virtual filter can give the appearance of your team all being in a room together. The feature connects meeting attendees by bringing their video feeds together in one space. It does this by embedding visuals from separate cameras into a shared environment. This is an alternative to the grid layout that places camera feeds side-by-side.

 

With teams working for extensive period of time, digital solutions like this can help to boost morale and keep up camaraderie.

 

Integrate Your Telephony With Teams Voice

There are further upgrades you can make to Microsoft Teams to boost functionality and improve communications.

 

One of these is Teams Voice. This innovative new product from voluntary sector communications experts, Class Networks, lets organisations make and receive external calls through Microsoft Teams. This solution can take the place of their existing phone system, saving charities time and money.

 

By combining their telephony system with Microsoft Teams, Teams Voice represents a simple option and provides key benefits.

 

The first of these benefits is reduced cost. Leveraging the resources you’re already using on the Microsoft platform keeps costs to a minimum. This is because you’re not paying for anything extra like line rentals, SIP trunk rentals, cloud user licensing or phone handsets. Instead, Teams Voice makes the most of the Office 365 licensing and devices your charity is already paying for.

 

Teams Voice also allows charities to control costs by providing a calling plan for Microsoft Teams users to make unlimited phone calls to and from any local, national and mobile number.

Charities can benefit from a unified platform for all their internal and external communications. This means that means video meetings, instant messaging, file sharing and collaboration – with calls to and from people outside the organisation seamlessly included – can all be done through a single platform.

 

Users can make calls from any device or location with no specialist equipment needed. You can choose to use headsets or go hands-free, from the app, browser or a mobile device. This makes it a lot more convenient for users working from home or remote locations.

 

Charities don’t need to worry about keeping in touch with existing contacts, as users retain their existing numbers and can use all the traditional telephone functionality such ase ring groups, queues, auto attendants and voicemail. All of this can be managed through Microsoft Teams.

 

There are no additional user accounts with more passwords to manage, because staff simply use their existing user accounts in Microsoft Teams, putting you in control of security and saving time.

 

We’re Elixis Technology

In the ever-changing, technology-centric world we live in, it’s vital to have an I.T. solution source you can count on. At Elixis Technology, it is our mission to help businesses — big and small — produce the results their customers demand, with technology that actually works.

.

News Source: https://charitydigital.org.uk/

Working in The Cloud

Jeff Remote Working December 4, 2020

As we have previously explored, the world has been turned on its head by the Covid-19 pandemic. The sudden move to remote working forced businesses to panic buy tools that do not serve a purpose, they cannot use effectively, or that they do not understand.

 

The increase in remote working has accentuated the already rapid increase in the use of IT and cloud infrastructure; both are gradually becoming the most integral part of most businesses worldwide. Adopting these techniques is the logical thing to do, especially in the world of today. The cloud allows remote working to be possible, and for you to create a business infrastructure that has the power to produce advanced levels of productivity compared to the original limited methods of pen and paper.

 

Cloud infrastructure is not easy to understand. Let us explore some ways to be sure you know what you are buying.

 

Questions

Questions are important. Asking yourself some questions regarding your cloud infrastructure can be beneficial to your business now and into the future.

 

Where is my data stored?

A key question, and one of the most important questions of all. Knowing where your data is stored is a must, as data transferred outside of the country of origin can be illegal unless sufficient legal protection is in place.

 

How difficult is the migration?

Long lengthy migrations can have a serious effect on production, perhaps even causing you considerable downtime. Find out from the provider how difficult a transition to the new infrastructure could be. It can pose problems such as staff training not being cost-effective, or the time it takes to finish migration impacting workflow is too much compared to other providers’ options – check first.

 

Is it familiar?

Familiarity is key. Everyone gets used to a certain way of doing things – that is not to say that change is not necessary but keeping those changes as gradual as possible is of the utmost importance when it comes to business. Remote working can be hard enough to adjust to without added stress and change to work-processes all happening at once. It can also be a very time-consuming exercise to train staff in the new systems, especially from a remote work setting.

 

Does it allow for integrations?

Integration has the power to dramatically improve the productivity you produce on the average workday, especially within a remote work setting. Applications like Microsoft Teams offers a way to find all your work needs in one easy to use place.

 

It can be difficult to know what you are buying in the world of IT – some of the language used is solely directed at a certain demographic that already has knowledge of the matter and speaks the same language. Here is an example of four main cloud infrastructures that are subscription-based.

 

Four cloud infrastructure acronyms

  • SaaS – Software as a Service
  • IaaS – Infrastructure as a Service
  • PaaS – Platform as a Service
  • HaaS – Hardware as a Service

Let us take a further look at the acronyms and their meanings.

 

SaaS

SaaS is where a third-party provider hosts applications whilst making them available to customers over the internet – all on a subscription-based model. Your agreed payment plan includes the latest software upgrades and a secure environment for storage and collaboration, all with constant monitoring.

 

IaaS

IaaS is a computing infrastructure that is managed over the internet. Your agreement puts the responsibility of the infrastructure in the hands of your provider whilst you provide and purchase your own software – software that must be monitored and maintained by you. Your provider has no responsibilities surrounding your software or its condition.

 

HaaS

HaaS is a business model where your provider will supply you with your hardware within your agreed monthly fee, which could range from printers to fax machines to phones. Your provider will be responsible for the maintenance of this hardware.

 

PaaS

PaaS is a type of cloud computing that offers a platform to clients, giving them the free reign to manage certain applications of their own without any responsibility of maintaining the infrastructure behind it.

 

This terminology will put you in good stead in your quest to buying the correct tools to utilise your remote working. Still unsure what you need? Think you still need some help? We can help you.

 

Elixis Technology is here to help

At Elixis Technology have the expertise to guide you in a personally tailored direction that best suits your business. We can ensure you buy the correct tools to support a remote work setting, thereby helping your employees to thrive – whatever the setting. Contact us to find out more today.

 

For more information, feel free to send us a message.

Identifying the tools you need for Remote Working

Jeff Remote Working December 4, 2020

As we previously mentioned, the pandemic has forced a change in work practices. Some businesses have been had to close their doors, others have reduced working hours and staff teams, but most have converted to a remote work setting at an impressive speed

 

This pace meant that most did not have time to research the tools that would be best for the way they run their business. It can be difficult to search for them – there are thousands of companies claiming to offer ‘the best service’ – making it all too easy to be wooed by a company that doesn’t quite fit your individual needs or offer the correct tools for you.

 

There are many parts of your business you will need a tool for – appointment taking, for example, or a time management application. Arguably most important is a tool to allow communication between not only yourself and your staff force but for your employees to converse with each other too.

 

Communication tools – their importance to a good remote working infrastructure

Without a workforce that communicates fluently and effectively with one another there is no way a business can survive; whether it be a small local firm or an international corporation the same rule applies.

 

Flexibility when remote working is one of the main positives for employees. Finding a tool that is easy to access and supports mobile device platforms is essential.

 

Communicate with your employees by setting up a channel to inform them of any business changes, get feedback from them to improve the IT, and simply check-in and see how they are doing.

 

Tools that encourage communication between different sectors of your business are beneficial to a workflow. In some cases, employees converse more with other departments when working remotely than when in-office. Project management tools are also a major asset and can help you manage your team, and work structure, much more easily.

 

Through the tools you choose to build your remote work infrastructure around you should appoint a trusted leader in charge of employee queries and welfare – they should make it their mission to keep staff happy and feeling productive in the remote work setting.

 

Identify a trusted team leader

Remote working poses different problems than the ‘normal’ work setting – because of this, it is important to ensure that your staff are supported to perhaps an even greater extent than before. Technical aspects of home working can cause stress and have consequences regarding employee welfare; this makes it imperative that your workforce has a point of contact to voice concerns, queries, or sometimes even just have a conversation.

 

It is the technical elements involved in remote working that are the real difference between success and failure. It’s all well and good having a trusted team leader and the best of intentions, but if this aim isn’t mirrored in your choice of the digital solution you provide then you will find that staff consider Shadow IT a more attractive solution. (See the previous blog in series for details on Shadow IT).

 

The best digital solutions

There are different digital options on the market claiming to solve the problems of communication, collaboration and productivity – all, I am sure you will agree, are integral to a business being successful. Microsoft 365 offers all three in abundance.

 

Microsoft 365 is one of the most well-known digital solutions on the market, with its range of well-known and widely used applications tailored around these essential functions, all within a secure environment. 365 offers a feature called ‘Teams’, with 115 million daily active users, Teams is at the peak of its powers and is the fastest growing business app of all time. Let us see some features of Teams that earned it this illustrious title.

 

Features that make Teams the go-to digital solution for remote working

  • Real-time alerts and communication capabilities
  • Full integration with Microsoft 365
  • Ability to implement granular access control
  • Automation capabilities
  • Version control features
  • Ease of use
  • Project management, scheduling, and extensive event management features
  • Shared access to resources
  • Secured authentication support
  • Co-authoring capabilities

 

These are just some of the features it can offer. Teams has all the tools essential to assist you in ensuring your remote team is as equipped as possible to enable them to work effectively. Teams will alleviate any worries you may have about remote working.

 

Cannot find the correct tools for your remote working? We’re here to help!

Elixis Technology can assist you in finding the correct tools for a successful remote working culture within your business. We take the strain of your IT, so you do not have to. Contact us now if you want to be rid of the stress and worry that comes with IT.

 

For more information, feel free to send us a message.

Avoid Shadow IT!

Jeff Remote Working December 4, 2020

This year has forced a hasty transition to unfamiliar work practices. Employers have had to be creative in their approach to making the workplace safe for all employees – unfortunately for some this has not been possible. Others have adapted to an at least partial homeworking team to enable them to continue working at something at least resembling the same levels of performance as pre-Covid-19.

 

Ensuring you do not invest in inadequate tools for your staff working from home can be challenging. The need for a good quality of remote working tools has never been more important – they are essential to the success of your team. Without the correct software, your staff cannot be expected to achieve a good standard of work and thrive.

 

A problem for employers has been the adoption of ‘Shadow IT’ by their employees. What is Shadow IT? Why is it so bad? How will it affect my business? All valid questions. During this blog, we will answer these questions and guide you toward solutions that are beneficial for both you and your employees if adopted correctly.

 

Shadow IT

“In big organisations, shadow IT (also known as embedded IT, fake IT, stealth IT, rogue IT, feral IT, or client IT) refers to information technology (IT) systems deployed by departments other than the central IT department, to work around the shortcomings of the central information systems.”¹

 

We take for granted that in the office setting all software, hardware and network services are monitored consistently and are protected and licensed with specific authorisation protocols to ensure access only to authorised employees. With remote working becoming more and more common employees are increasingly making up their own minds which tools they use to work with. This can be dangerous. The company data is usually stored in a secure place, but, with the introduction of Shadow IT, you will find that employees have started storing data in non-IT company services instead (WhatsApp, WeTransfer, or Dropbox), which can mean trouble for their employers.

 

The security concerns of Shadow IT

The examples above are being used out of the remit of control of the business if management has not authorised and/or provided such systems. They may be insecure, potentially leaving sensitive data vulnerable. Any tools used without the control of the business are also being held out of the organisation’s regulatory obligations – meaning potential legal ramifications if a data loss/theft is suffered.

 

Why do employees choose Shadow IT?

There is a multitude of reasons as to why an employee may choose to use Shadow IT. Most common is that the employee feels they don’t have the tools they deem necessary to complete their daily tasks to an acceptable standard, leaving them no choice but to go out and look for a tool that can achieve it. For others, it can be as simple as not having the education to understand the problems that Shadow IT can cause to a business.

 

Sometimes it is a familiarity that tempts an employee. You may have provided them with an extensive collection of tools that you deem perfect for their job role, but they may not have the technical aptitude to use them properly when in a remote setting. Therefore, they find using a familiar tool eradicates the need for this knowledge of new IT. Perhaps the remote work setting posed more challenges than you anticipated – you need to communicate with your employees to find out what these challenges are and how to solve them in a secure and cost-effective way.

 

How to approach Shadow IT

Where you have employees preferring Shadow IT, take their feedback and implement a strategy that best suits their needs. Approach Shadow IT by asking yourself some questions surrounding its use:

 

  1. What apps have our team sourced and are using outside of the company remit?
  2. How did they have IT permissions to install or use paid apps in the first place? Do we need to make changes or review security policies?
  3. What functions do these apps serve that could be solved with what you have already? Does the team simply require IT education, or are the apps perhaps better aligned to your requirements, meaning you should take ownership and permit the services to be used?

 

The Shadow IT used by employees needs to be in a shareable format and compatible with what is already provided by the company.

If you offer the correct tools you know the answer to these and other operational questions before even starting.

 

Finding a mutually beneficial answer to these questions will allow your remote work infrastructure to be stronger and more secure; employees will feel more productive using tools that work for them, your business will thrive and remote working can become a positive change rather than a necessary one.

 

Is Shadow IT a problem for you?

Elixis Technology will help you buy the best tools to ensure a productive, secure and legal remote work environment. We are here to ensure you get the technology that actually works for your business to help you achieve the results that your customers demand of you. Contact us and find out how we can help you.

 

For more information, feel free to send us a message.

 

https://en.wikipedia.org/wiki/Shadow_IT¹

What is Microsoft Teams? Here’s what you need to know

Jeff Technology, Trends November 23, 2020

As companies acclimate to remote working, it’s more important than ever to have functional, well-integrated software that can help co-workers connect with each other and share information — without needing to call a meeting.

 

Enter Microsoft Teams. Like other workplace integration programs, such as Slack, Teams allows you to easily communicate with your co-workers in one secure window.

 

Teams, slated to replace Skype for Business by July 2021, is able to do a lot of things that its competitors can’t thanks to its ability to easily integrate with Office 365. So on top of chatting with co-workers and creating chat rooms for smaller groups, you can also use a number of helpful Office applications, like Outlook, OneNote, and Excel.

 

Here’s an overview of how Microsoft Teams works.

 

What you need to know about Microsoft Teams

When you create a new Team and add members, they are all automatically added to the “General” channel. From there, you can create new channels for smaller teams or groups, which essentially function as different group chats or conversations.

 

For example, while your General channel might include everyone in your company, you might also create specific channels for different departments, like marketing, accounting, sales, etc. You could also make a single team for one department, if it’s a larger one, and divide that team into subsections from there. You’re free to organize your workplace however you choose.

 

These conversations will function as the main method of communication — though you can also message other team members privately at any time. Conversations are easily searchable, and you can even tag specific people if there’s a message you need them to pay attention to.

 

Within these conversations, you can easily schedule and carry out group calls with your team or channel — so now those midday meetings and end-of-week get-togethers can also happen right in the workspace app.

 

Microsoft Teams works with other Microsoft and third-party apps

Creating a new Team also creates a corresponding Planner, SharePoint, Office 365 group, and shared OneNote. All of these additional programs can be accessed directly from the Teams window and allow you to work on shared documents and projects simultaneously, without the need to send files back and forth.

 

These integrated workspaces appear as tabs in the Teams window. The three tabs that thereby default are Conversations, Files, and Notes. Files is a tab where you can open any Microsoft 365 file that you’ve shared in the workspace, so you don’t have to keep switching between windows whenever you want to work on a different project. Notes is a tab where your whole Team can keep running notes, for whatever purposes they deem necessary.

 

In addition to these integrated Microsoft programs, Teams also lets you add new tabs integrating other third-party software, like Asana or Soapbox. Even if your workplace doesn’t exclusively use Microsoft products for organization, you can still keep everything in one neat, convenient window.

We’re Elixis Technology

In the ever-changing, technology-centric world we live in, it’s vital to have an I.T. solution source you can count on. At Elixis Technology, it is our mission to help businesses — big and small — produce the results their customers demand, with technology that actually works.

.

News Source: https://www.businessinsider.com