Small Business Archives - Thrive https://thrivenextgen.com/category/small-business/ NextGen Managed Services Provider Tue, 01 Aug 2023 15:01:21 +0000 en-US hourly 1 What Can We Learn from the Super Bowl? https://thrivenextgen.com/what-can-we-learn-from-the-super-bowl/ Wed, 06 Feb 2019 15:03:01 +0000 https://www.thrivenetworks.com/?p=16137 While I’m sure we can learn something, I think we can all agree defense is boring. The same is true for security. Your defensive security, that blocked someone from potentially getting into your network, is…

The post What Can We Learn from the Super Bowl? appeared first on Thrive.

]]>
While I’m sure we can learn something, I think we can all agree defense is boring. The same is true for security. Your defensive security, that blocked someone from potentially getting into your network, is a lot less impressive than saying you hacked NASA.

But to win the Super Bowl the Patriots defense needed to be one step ahead. Yes, Tom Brady is who everyone talks about, but if the defense hadn’t done their job, they would not have won the game.

So, I’m going to spend the rest of this time talking defense. The unsung heroes.

Defense is really hard. You have a limited budget, with limited time. An attacker can choose the time and place on where to attack, while defense must be on 24 hours a day, 7 days a week.  They have no idea when or where the attack will happen, or what is going to be the target. Will it be an end user compromise or an attack on your website?  When was the last time someone reviewed your firewall for open ports, or checked the permissions of your end users? These are the worries that keep the defensive team up at night.

If you are a smaller company, you might be thinking that there is no way you can even imagine having a defensive security team… you are not the Patriots with an unlimited budget. That is okay; there are things you can do to help your company stay more secure. There is no such thing as a one-box-to-save-everyone solution. Ten years ago, everyone put in a firewall and believed they were secure. Now, with people working from home, connecting with smart phones, using web applications, the firewall is only a piece of the overall security strategy. You need to give your end users security awareness training, so they have a fighting chance to protect the company and themselves from hackers. You need to do external vulnerability scans to see what type of attack vectors are available from the outside. You need to look at the logs all of your devices generate.

A trusted security partner can help. You might not be able to do everything right away, but small steps in the direction of security can pay big dividends. Feel free to contact Thrive to discuss any of our security solutions, we would be happy to help.

The post What Can We Learn from the Super Bowl? appeared first on Thrive.

]]>
Stop Running your Business like it is 2001 https://thrivenextgen.com/stop-running-your-business-like-it-is-2001/ Thu, 02 Aug 2018 12:31:59 +0000 https://www.thrivenetworks.com/?p=15697 This is more of a rant, but it has to be said.  Too many of you are running your business like it is 2001.  Your business might be growing, you are adding more relevant product,…

The post Stop Running your Business like it is 2001 appeared first on Thrive.

]]>
This is more of a rant, but it has to be said.  Too many of you are running your business like it is 2001.  Your business might be growing, you are adding more relevant product, but your systems and your processes have not changed.  Specifically, your security.

Let me give you some examples.  A company has this amazing firewall that can process 1,000’s of packets per second, a SIEM that is monitoring every server and workstation, but low and behold the helpdesk is saving all the passwords in an excel document on the file server. Unencrypted.

You run a summer camp for disabled children.  You have medical data unencrypted on your file server.  You do have a firewall, but the firmware hasn’t been upgraded in 5 years.

You are the HR director and you keep all the HR records on your laptop.  You occasionally scan documents and send them to the payroll company.  Is your laptop encrypted?  Does that big corporate scanner have a hard drive?  Has anyone ever looked to see if that hard drive keeps the images from the scanner?

The problem with the above scenarios is that nobody thought the hackers were already in the system.  If you expect hackers to be in your system, then you will be prepared for when that eventually happens.  Because it will happen.  Back in 2001 you only heard about attacks on big companies and it was rare.  Now, small companies get hacked daily.  These companies are much easier to break into because their security is poor.  Large companies have processes in place, security personnel that yell at you for leaving unencrypted passwords, they destroy hard drives when getting rid of machines, and they make sure data is stored in the proper designated places.  Mid-sized and small companies will put some security in place, but don’t change their attitude about data security.  Why?  Because it is hard.  Changing processes are hard. Teaching people how to use a password management system and to use it is difficult.  People have not accepted the fact that their company WILL get hacked.  Every security person you talk to will tell you, it is not if you get hacked, it is when you get hacked.

It is time you looked at what your employees are doing with an eye towards information security.  Ask yourself, if this data got out, how much damage would it do to my company?  You will quickly determine what you will need to protect.  Changing people’s processes on where they put the data and how they save it will be hard, but your bottom line might depend on it.

If you have questions on what steps to take to bring your business’ security measures into 2018, contact Thrive today.

The post Stop Running your Business like it is 2001 appeared first on Thrive.

]]>
Server and Network Management Challenges https://thrivenextgen.com/server-and-network-management-challenges-and-how-to-overcome-them/ https://thrivenextgen.com/server-and-network-management-challenges-and-how-to-overcome-them/#comments Thu, 10 Nov 2011 18:30:24 +0000 http://thrivenetworks.com/blog/?p=2706 Server and network availability is an essential aspect of maintaining business productivity and continuity. IT administrators face many challenges and responsibilities when it comes to maintaining the network and keeping downtime at a minimum.   Depending…

The post Server and Network Management Challenges appeared first on Thrive.

]]>
Server and network availability is an essential aspect of maintaining business productivity and continuity. IT administrators face many challenges and responsibilities when it comes to maintaining the network and keeping downtime at a minimum.   Depending upon the size of the organization there are many components to keep track of such as device management, updates, patching, new application configurations, compliance requirements, and issues that arise as the result of human error or environmental factors.  So, what are some of the challenges that IT administrators face and what are some of the ways you can overcome these issues?

Management Challenges for IT Administrators

IT administrators are responsible for the backbone of modern information technology systems which are reliant on complex network infrastructures. For medium to large-sized companies there can be literally hundreds of thousands of devices which are mission critical to company operations.  The server and network devices can include many different types of hardware from a variety of vendors, security components, switches, routers, and other components that make up the infrastructure.  Here are some of the challenges in terms of a manual approach to managing server and network infrastructures.

  • Configuration Tasks: When using the conventional approach to network administration IT personnel typically invests a lot of time into performing configurations which are repetitive and time consuming.  This takes time away from planning for future innovations that increase productivity.
  • Network Growth: As a company expands so does the number of devices and applications. This means additional tasks in terms of configuration. IT administrators end up prioritizing according to business task importance which increases the risk of errors and network outages.
  • Network Security: The tasks associated with network security can be monumental in terms of patching, firewalls, intrusion detection monitoring, and other security measures which are used to secure data on a server.  This leaves a lot of room for error which increases the risk for data breaches.
  • No Centralized Management: When you use the conventional approach to server and network management there is no centralized control for keeping track of configuration changes, updates, and other mission critical steps which are required to meet compliance regulations.  Performing each management task separately is time consuming and repetitive.
  • Lack of Accountability: With most network infrastructures there is no way to ensure accountability for device configurations and user actions.  If a security breach occurs or there is an unauthorized configuration change there is typically no way to trace the action back to a specific user.

How to Conquer Server and Network Management Issues

Thanks to a higher availability of solutions providers and automated tools, server and network management can be simplified. This leaves more time for IT administrators to focus on new company innovations instead of performing time consuming and repetitive tasks.  Automated tools provide a way to keep track of configurations, reduce the possibility for human error, improve policy compliance, and reduce operational costs.

Additionally, many companies choose to use a virtualization solutions provider that can oversee and manage server and network infrastructures either onsite or from a remote location.  Most solutions providers offer configuration, change, and compliance management services.  They are also equipped with the necessary automation tools to reduce errors and perform audits and reports on the status of network configurations.

With a quality virtualization solution  in place companies can make the best use of their resources and time.  To learn more about how you can improve productivity and business continuity while cutting costs contact Thrive Networks today for a consultation.

The post Server and Network Management Challenges appeared first on Thrive.

]]>
https://thrivenextgen.com/server-and-network-management-challenges-and-how-to-overcome-them/feed/ 3
How to Choose the Best Data Protection Solutions https://thrivenextgen.com/how-to-choose-the-best-data-protection-solutions/ https://thrivenextgen.com/how-to-choose-the-best-data-protection-solutions/#comments Tue, 08 Nov 2011 19:30:30 +0000 http://thrivenetworks.com/blog/?p=2644 Every company is aware that the proper data protection measures are of utmost importance. Yet many businesses still utilize older methods of data backup such as tape systems, costly onsite backup methods, and offsite systems…

The post How to Choose the Best Data Protection Solutions appeared first on Thrive.

]]>
Every company is aware that the proper data protection measures are of utmost importance. Yet many businesses still utilize older methods of data backup such as tape systems, costly onsite backup methods, and offsite systems that may mean several days until recovery takes place.  These methods consume resources and pose more risks of failure in addition to being complex, costly, and labor intensive.

New data backup and recovery technologies eliminate failure risks while increasing efficiency and promoting faster recovery time.  Additionally the newer technologies and services reduce network risks that often go undetected and provide solutions that reduce storage management and maintenance costs.

Every company has different data storage requirements that depend upon the type of industry.  In order to choose the best data protection solution it is important to know what your options are and why these options are the better choice for information security management.

Hosted Cloud Services

 Cloud-based data protection is an option that many companies are using due to its accessibility, reliability, and security.  Data storage in the cloud represents an affordable solution for many businesses because it has the capability to provide the best of both worlds which is immediate access to data while enjoying the reliability and security of offsite storage. Also, most cloud service providers offer different levels of vaulting solutions to meet industry compliance and regulatory standards.

In terms of protecting your servers and workstations, a quality cloud hosting provider is capable of backing up your servers in the cloud and data which is relevant to your workstations.  If your company experiences a hardware failure or natural disaster you can quickly recover by tapping into your resources with the cloud hosting service.

Onsite Data Storage and Backup

 Some companies deploy onsite data storage  to provide easy access to data.  By storing and backing up data onsite recovery time is faster than offsite storage and you can add storage as needed.

A few of the drawbacks of onsite data storage  is your company can suffer a complete loss in the event of a fire or flood if you are not using multiple backup methods.  Also, it is necessary for someone to monitor the system and perform backups on a routine basis.  Depending upon the data workload, onsite storage can also be costly in terms of hardware and maintenance.

 Offsite Storage and Backup

 Offsite storage is offered in a variety of different methods which include tape storage, data warehousing, or data storage strategies which are configured by the company.   Offsite data storage utilizes redundant data storage which provides multiple backup copies and can be designed for storage in multiple locations.

 Although offsite data storage eliminates the possibility of human error it can be costly and bandwidth intensive when it comes to ongoing backup.  The recovery process is significantly slower than onsite storage depending upon the methods that are used for recovery.

What we have described here are the primary options that companies consider for data protection and storage.  It is important to mention that multiple backup and storage methods are commonly deployed for added reassurance in the event of a disaster.

Data protection and backup  does not have to be complex.  To discover cost effective options for data protection, contact Thrive Networks for assistance with setting up a data protection and backup strategy.

The post How to Choose the Best Data Protection Solutions appeared first on Thrive.

]]>
https://thrivenextgen.com/how-to-choose-the-best-data-protection-solutions/feed/ 1
Thoughts on Reducing IT Capital Expenditures https://thrivenextgen.com/thoughts-on-reducing-it-capital-expenditures/ https://thrivenextgen.com/thoughts-on-reducing-it-capital-expenditures/#respond Thu, 03 Nov 2011 18:30:19 +0000 http://thrivenetworks.com/blog/?p=2651 In the current economic downturn where IT budgets are declining and the demand for IT resources is increasing, the expectations for many companies are you must accomplish more with less. As a result, many businesses…

The post Thoughts on Reducing IT Capital Expenditures appeared first on Thrive.

]]>
In the current economic downturn where IT budgets are declining and the demand for IT resources is increasing, the expectations for many companies are you must accomplish more with less. As a result, many businesses and enterprises are working to find ways to cut costs without compromising productivity while remaining competitive.  With all of these pressures and responsibilities how do you ensure ongoing growth while meeting compliance requirements and your service level agreements?

The answer to this dilemma is the incorporation of new technologies into your IT infrastructure.  Although this may sound like you are increasing IT capital expenditures you are actually cutting costs while increasing productivity in response to the ever changing market.  Here are some thoughts on how to reduce costs while still maintaining the competitive advantage.

IT Lifecycle

 It is a well known fact that IT infrastructures which are older are much more expensive to maintain and present many challenges in terms of working with hardware and software that is no longer compatible with new applications.  In many cases the older IT infrastructures tend to remain in operation because they serve as a comfort zone, so to speak, for the IT department and management despite the fact that the system is very costly to maintain.  If one were to analyze the exact cost of retaining the older infrastructure chances are the results would show exorbitant maintenance and operating costs in addition to high energy consumption.  So what is the answer?

Let’s consider the virtualization model.  Virtualization is a methodology that provides a solution for companies to consolidate older infrastructures.  This is accomplished by combining servers which can then be controlled through single point access.  This type of system increases the utilization of hardware by as much as 85 percent where the older infrastructures may use as little as 20 percent.

Transitioning to virtualization means cutting operating costs significantly while improving reliability and reducing downtime.  Server consolidation is also scalable so you can deliver IT services on-demand. Plus fewer servers mean lower energy consumption and reduced cooling requirements.

Information Lifecycle Management and Data Storage

 Without a doubt, the growth of data and information is a major contributor to the increase in IT costs. The older infrastructures are unable to meet the demand for more affordable solutions that help to reduce the data storage footprint.  Older methods such as tape storage can increase downtime in the event of a disaster plus offsite storage is typically more expensive compared to the newer methods for data storage and backup.

When you consider a cloud hosted model, virtualization is the channel to a solid data storage and backup system in the cloud.  This means that your IT resources are consolidated into logical steps for storage, network, and servers which create a virtual datacenter.  This is known as a holistic approach to information lifecycle management and data storage requirements. The result is the reduction of IT capital expenditures in terms of maintenance and administration while improving the level of service.

Virtualization and cloud hosted services are being considered by more companies for the reasons we have discussed in the article.  Hopefully these thoughts will help to spur some ideas and options as to how your company can save on IT capital expenditures.  When it comes to remaining competitive in today’s marketplace most companies should not be asking, “Why should we consider virtualization and cloud hosting?”  Instead, the question should be, “Why are we not already using virtualization and cloud services?”

If you are trying to find ways to reduce the cost of IT capital expenditures, contact Thrive Networks today for assistance with designing a strategy for reducing IT costs over the next one to three years.

The post Thoughts on Reducing IT Capital Expenditures appeared first on Thrive.

]]>
https://thrivenextgen.com/thoughts-on-reducing-it-capital-expenditures/feed/ 0
Network Monitoring Methods https://thrivenextgen.com/network-monitoring-methods-and-why-they-are-important-for-small-business/ https://thrivenextgen.com/network-monitoring-methods-and-why-they-are-important-for-small-business/#comments Thu, 06 Oct 2011 13:42:05 +0000 http://thrivenetworks.com/blog/?p=2640 Network monitoring is an essential responsibility for businesses of all sizes.  Medium-sized and large companies typically have a network monitoring system in place either onsite or offsite in the cloud but what about small businesses? …

The post Network Monitoring Methods appeared first on Thrive.

]]>
Network monitoring is an essential responsibility for businesses of all sizes.  Medium-sized and large companies typically have a network monitoring system in place either onsite or offsite in the cloud but what about small businesses?  This is exactly what hackers are asking when they are seeking to breach a network.

In the last few years small businesses have become the target for network intrusions because hackers are aware that most small businesses do not implement security practices.  The perception is that network security is only important for large companies, government organizations, and financial institutions.  This perception is rapidly changing with the increased number of small businesses. So, what does network monitoring typically involve?  Let’s start by defining network monitoring.

What is Network Monitoring?

Network monitoring involves multiple methods which are deployed for the purpose of maintaining the security and integrity of an internal network.  The internal network is also known as a Local Area Network (LAN) and monitoring encompasses hardware, software, viruses, spyware, vulnerabilities such as backdoors and security holes, and other aspects that can compromise the integrity of a network.

Network Monitoring Methods

There is a wide variety of network monitoring methods which are implemented by IT professionals.  The techniques are deployed via network monitoring solutions that automatically detect and respond to security and performance problems.

  • Intrusion Detection: Intrusion detection monitors local area networks for unauthorized access by hackers.  This method can be implemented manually however, most IT professionals prefer to use an intrusion detection program which automatically detects viruses and malware, network vulnerabilities such as backdoors, logic bombs and other security threats, individual PCs which are connected to the network and file settings.  intrusion detection programs generate reports following a system check so any issues can be addressed.
  • Packet Sniffing: A packet sniffer is a program that inspects every packet of information that passes through the network.  The purpose of a packet sniffer is to detect unauthorized network monitoring software which may be installed by hackers for spying on business activity and information processes.
  • Vulnerability Scanning: A vulnerability scanner will periodically scan the network for vulnerabilities and weaknesses which open up the potential for an exploit.  This method varies from intrusion detection because it detects a weakness before the attack has taken place.  Intrusion detection identifies unauthorized access after the hacker has breached the network.
  • Firewall Monitoring: Firewalls monitor the traffic that is coming in and out of the network.  Firewall monitoring tracks the activities of a firewall to ensure the screening process for incoming and outgoing connections is functioning properly and securely.
  • Penetration Testing: Penetration testing is carried out by IT professionals by using methods that hackers use to breach a network.  The purpose of this process is to take network security to another level by discovering vulnerabilities that hackers may have knowledge of but have not yet been detected via other monitoring methods.

If you have a small business you may want to consider network monitoring as an essential part of your data security strategy.  As you can see there is a lot involved with keeping a local area network secure which can result in increased network maintenance costs.

The other alternative is to consider using a network monitoring service that will oversee the important security aspects of your underlying infrastructure.  If you would like to learn more about network monitoring contact Thrive Networks to discover ways to reduce costs while maintaining network integrity.

The post Network Monitoring Methods appeared first on Thrive.

]]>
https://thrivenextgen.com/network-monitoring-methods-and-why-they-are-important-for-small-business/feed/ 2
How Hackers Use Backdoors to Access a Network https://thrivenextgen.com/how-hackers-use-backdoors-to-access-a-network/ https://thrivenextgen.com/how-hackers-use-backdoors-to-access-a-network/#respond Thu, 22 Sep 2011 16:24:13 +0000 http://thrivenetworks.com/blog/?p=2394 Backdoors are a method that hackers use to establish unauthorized access to a network from a remote location.  Hackers use backdoors as a means of gaining repeated access to a network without being logged by…

The post How Hackers Use Backdoors to Access a Network appeared first on Thrive.

]]>
Backdoors are a method that hackers use to establish unauthorized access to a network from a remote location.  Hackers use backdoors as a means of gaining repeated access to a network without being logged by the systems administrator.  This type of network intrusion hides its presence while the hacker is actually using the network without the knowledge of others.

How Backdoors Work

Hackers gain access to a network by creating backdoors on compromised systems.  This is accomplished by searching for vulnerabilities in the network such as unused accounts which have passwords that are easy to crack. Once the intruder is in they change the password to a different password that is difficult to break.

When the systems administrator monitors the network, the account where the hacker modified the password does not appear.  This makes it difficult to determine which accounts are unused and should be locked from the network.

Although a backdoor is capable of hiding a hacker’s initial entry from the systems log, the intruder can still continue to access the network despite the fact that the systems administrator has detected unauthorized access in the systems log.  This is especially true if the default passwords created by the manufacturer are left on the system.

A backdoor is used by hackers to install malware for the purpose of stealing information from a network such as company trade secrets or customer financial data.  Backdoors can also be used to launch Denial of Service attacks which can bring down an entire company network. DoS attacks are performed by sending an excessive amount of information packets over a network which results in network failure.

 How Hackers Find Network Vulnerabilities

 In order to create a backdoor on a network the hacker must find the weak points in the system.  The weak points are known as vulnerabilities which are the perfect location for an exploit.  Often these are unused accounts on a network perhaps once used by a former employee that left the company or other type of situation.

Vulnerabilities in a network system can be detected by using specialized software that the hacker activates from a remote location to sniff around the system and identify the weaknesses.  The typical target is unused accounts or services or even accounts that have been disabled.  The hacker can choose one of these components and remove it and then install a new system under the same name.  This helps the hacker’s point of entry to remain anonymous when the systems administrator performs a security inspection of the network.

Once the hacker installs the system to gain access to the network the files are hidden deep in system directories using names that are not conspicuous to a systems administrator.  The same method is used when accessing a port to establish backdoor access. This allows the hacker to escape detection on the systems log when the administrator reviews it.

A backdoor can also provide the hacker with access other components of a network by creating an account that allows system privileges.  An account that has system privileges is similar to your PC administrator account.  It allows you to change passwords and privileges for other accounts and basically have full access to the network and its components.

There are many different types of backdoors but the type that allows the hacker full access is the most hazardous.  Keeping hackers out of network requires careful monitoring of the system and consistent review of the event log that provides a report of events on the network.  A systems administrator that is on top of how network criminals operate and the latest techniques they use will be able to adequately protect the network from intrusion. Allow Thrive Networks to monitor your network and save you from potential intrusions. Contact us today for more information!

The post How Hackers Use Backdoors to Access a Network appeared first on Thrive.

]]>
https://thrivenextgen.com/how-hackers-use-backdoors-to-access-a-network/feed/ 0
How to Turn Off “Enable Editing” in Microsoft Office 2010 https://thrivenextgen.com/turn-off-enable-editing-in-microsoft-office-2010/ https://thrivenextgen.com/turn-off-enable-editing-in-microsoft-office-2010/#comments Wed, 25 May 2011 22:47:20 +0000 http://thrivenetworks.com/blog/?p=1972 Are you working in Microsoft Word 2010?  If so, how many times have you tried to jump into a document and start making some changes and nothing happens?  Oh, that’s right….. You forgot to click…

The post How to Turn Off “Enable Editing” in Microsoft Office 2010 appeared first on Thrive.

]]>
Are you working in Microsoft Word 2010?  If so, how many times have you tried to jump into a document and start making some changes and nothing happens?  Oh, that’s right….. You forgot to click on that annoying, little, yellow button on the top of the document.  You idiot!

Protected View in Microsoft Office 2010

As annoying as it may be, there are valid reasons for this new security feature in Office 2010, which is an improvement over security features in previous versions of Office.  As explained by the Microsoft Office 2010 Engineering Team

“With any piece of complex software, over time new file parsing exploits against it may be found. The older Office binary file formats had been susceptible to these types of attacks. Over the past years hackers have discovered ways to manipulate Office binary files so that when they are opened and parsed, they cause their own code embedded within the file to run. To address these binary file parsing attacks in Office 2007, several new XML based file formats were introduced.”

If you are generally savvy enough to not open documents from suspicious sources and enjoy an occasional walk on the wild side, well then here is a quick “how-to” on just turning the darn thing off permanently:

1.    Open any Office 2010 application (Ex: Word or Excel).
2.    Click on Office or File button, and select Options.
Microsoft Office 2010 - Enable Editing - File Options
3.    Under Options select “Trust Center” in the left pane.
4.    Click on Trust Center Settings in the right pane.
Microsoft Office 2010 - Enable Editing - File Options
5.    Click on the Protected View in the left pane of “Trust Center” window.
6.    Check/Uncheck Protected Mode Options below to fit your needs

Microsoft Office 2010 - Enable Editing - File Options

If you want to take advantage of this security feature in a customized way, you can actually go back to step 6 and set specific Trusted Publishers, Locations and Documents right from this Window.
Unfortunately, you need to apply these setting to each Microsoft Office application individually.

Hope this tip is helpful and saves you some time!

The post How to Turn Off “Enable Editing” in Microsoft Office 2010 appeared first on Thrive.

]]>
https://thrivenextgen.com/turn-off-enable-editing-in-microsoft-office-2010/feed/ 64
Working Remotely https://thrivenextgen.com/working-remotely/ https://thrivenextgen.com/working-remotely/#comments Tue, 01 Feb 2011 22:08:34 +0000 http://thrivenetworks.com/blog/?p=1961 In today’s world, disaster recovery is a huge topic of discussion for almost all businesses. In case of a flood or fire or any type of natural disaster, companies should want to have a backup…

The post Working Remotely appeared first on Thrive.

]]>
snowIn today’s world, disaster recovery is a huge topic of discussion for almost all businesses. In case of a flood or fire or any type of natural disaster, companies should want to have a backup plan in place to spend ideally no more than 24 hours down. This is big picture stuff. But what about the day to day? Employees should always be in a position where their productivity and efficiency are not hindered.

At its core, Thrive Networks is a service delivery company.  This means that our people are our product, so as long as they are happy, efficient, and productive at all times, Thrive can be confident in its ability to deliver the best customer service possible.  One approach to making sure that each and every day we don’t miss a beat, Thrive employees are given the technological ability to work remotely whenever necessary.   VPN access, terminal servers, and soft phones are available at Thrive to all employees.  These remote technologies are put into place not only for some catastrophic moment, but also for more common events such as the electricity going out in your office building or a snow storm hitting and the plows falling behind schedule.  Obviously there are industries that will remain exceptions, such as manufacturing or education, but for those businesses that can give their employees the ability to work remotely, I would certainly encourage it.

The reason I mentioned the previous snow storm example is because that is what is going on right now as I compose this blog.  This morning my supervisor sent an email stating that I should work from home today as opposed to braving what are still mostly unplowed roads.  My wife, however, made her way to her office, as her company has a less lenient policy on working remotely.  What this boils down to is that I’ve been working productively for the past 2 hours, while she is still  on the highway trying to get to her office located a mere 10 miles away.  So my point is simply, instead of having your employees arrive 2 hours late, worry about their commute home during the day, and likely have some people leave early to deal with snow removal, you could actually get more than a full day’s work from someone who can just pull up at their kitchen table and not have to worry about any of those things.  This is something I’m quite passionate about, but from a business perspective, as long as your employees are safe and happy on a day like this one, then you are bound to get more production from them.  I would strongly urge any business that hasn’t thought through their policy on working remotely in these terms recently to take these ideas into consideration.

The post Working Remotely appeared first on Thrive.

]]>
https://thrivenextgen.com/working-remotely/feed/ 1