This video features Thrive’s Channel Partner — Dan Passacantilli, Founder of Blue Front Technology Group. Blue Front Technology Group has been a channel partner of Thrive’s for 15 years.
Agents and Technology Consultants partner with Thrive to leverage our technical expertise coupled with our NextGen managed services. Thrive is considered a trusted advisor that partners rely on to offer their clients NextGen Technology Services.
For more information on how to partner with Thrive, CONTACT US today.
Still not using 2FA/MFA? No time like the present to make the change!Has your remote work policy changed in the last month or two? Are more of your employees working from home or at locations that are “untrusted”? The answer is almost certainly a resounding YES! Now more than ever you need to ensure that Two Factor Authentication (2FA) or Multi-Factor Authentication is being used throughout your organization in as many places as possible. Many people are becoming more comfortable with this concept as they are having to perform these same steps to access their personal accounts (banking, Gmail, etc.).
Whether it is accessing your corporate VPN or cloud-based applications such as Office 365, Salesforce, NetSuite, Workday or many others you need to make sure users are required to supply two forms of authentication to access company resources and data. Something they know (username and password) and something they have (a text message with a unique code or an app on their phone that must be clicked to accept the request to connect) are no longer optional in the workplace.
Microsoft has a Multi-Factor Authentication product called Azure Multi-Factor Authentication that can be configured to deliver Two-Factor Authentication four different ways. The Azure Multi-Factor Authentication service can send you a text message with a code that you must provide, call you on a preset phone number and provide you with the number, provide a rotating code on the Microsoft Authenticator smart phone application, or push a pop up message to your smart phone for your approval. Azure Multi Factor Authentication is available as a standalone product and is also included in Azure Active Directory Premium, Enterprise Mobility Suite, and Microsoft 365.
Fortinet also has Two-Factor Authentication capabilities built directly into the FortiGate firewalls. A physical token or a smart phone application can be used to get a rotating code that can be used as the One Time Password when connected to a FortiGate SSL VPN.
In addition to 2FA, geography-based access to your corporate resources should be something that you consider implementing. Allowing someone to connect from any location in the world may not be necessary, when your users should only be coming from certain geographies. If you only operate business in the United States, why not block any connection attempt from international locations? Sure, you may have users that travel internationally from time to time and exceptions can be made as they arise. Reducing your attack surface in as many ways possible is the best course of action to protect your business now and into the future.
If you are interested in learning more about how Two-Factor Authentication or geography based restrictions could better protect your business, CONTACT THRIVE TODAY!
The Single Cause Behind Most Vulnerabilities and How to Solve ItHaving been involved in hundreds of vulnerability assessments I can confidently say that most issues have a single underlying source. The discovered vulnerability could be an increased risk of ransomware exposure, buffer overflows, elevation of privileges, denial of service, weak encryption, etc. Regardless of the diversity of the vulnerabilities, there is commonly a single deficiency within the organization that led to the risk. It is a crucial component of any solid cyber security framework, yet it remains one of the least appreciated and maintained areas of Information Technology. By now, you may have guessed, that I’m referring to patch management.
Inevitably, a vulnerability assessment will overturn workstations, servers, switches, firewalls, routers, wireless access points, hypervisors and countless other devices which all need to be patched. Consequently, the IT department is consumed with months of maintenance windows to get everything updated. After many late nights, every piece of infrastructure is finally fully patched. The IT department can finally get a good night’s sleep! Unfortunately, it won’t last long because while all of those patches were getting installed more vulnerabilities were discovered which will require more patching. This is the never-ending struggle of patch management.
It’s true that most IT departments have a pretty good handle on patching workstations and servers by leveraging automated patching solutions. However, that addresses only a small piece of the typical IT infrastructure. What’s a sleep deprived IT department to do to keep up with the tidal wave of patches? It’s simple, embrace Thrive’s NextGen services.
- Offload all server and hypervisor patching responsibility by transferring workloads to one of Thrive’s many cloud solutions.
- Deploy ThriveCloud managed firewalls, switches and wireless access points to allow for automated patch and firmware deployments during scheduled maintenance windows.
- Leverage Thrive’s 3rd party patching solution to update often overlooked and highly vulnerable software like Java, Acrobat and Zoom.
For more information on Thrive’s NextGen managed services, CONTACT US TODAY!
Remote IT & Security. Is your business and corporate data at risk?Overnight, the COVID-19 pandemic has permanently changed our approach to remote IT and security. We went from offices full of collaboration and activity to at home offices now exposing businesses and corporate data to increased risk. At Thrive, we hold a daily management meeting to review and discuss the implications of a remote workforce during this experience. Many organizations are following a similar protocol as well, and although it has taken some getting used to, it has shined a light on how well we are able to collaborate remotely.
Our president, Marc Pantoni, mentioned the other day on one of these calls that the focus at the beginning of the Work From Home period was stability but as it matures, many organizations will start to focus on risk management as they were during prior to this unplanned event.
Over the years, we’ve seen disaster recovery tests become quite commonplace but now we’ll start to see pandemic tests or WFH tests become much more prevalent. This isn’t fear mongering, it’s prudent risk management. I surmise that like many of you, my work from home plan was my laptop sitting on a home office desk or perhaps a kitchen table. My home office did not have all the trappings of my branch office. Over the last couple of weeks, I’ve gotten quite efficient at WFH and for many end users that environment is here to stay even once we all return to the office semi-full time.
Securing that location will now become a higher priority. For many senior leaders and high-tech workers, we will look to high value yet low effort solutions to protect the household. For years network security companies have added a feature to their devices that is not very widely used that can provide “clean” network connections. This function, usually called transparent mode, introduces unified threat management appliances into home networks without changing the overall topology of the environment. This means that we can add intrusion prevention and malware protection at the network level without the needing to swap out the consumer wifi solutions, which are very popular. Fact is, having malware on a home network is as big of a problem as it is on an office network regardless of where it resides.
To understand this concept a little easier, here’s a simple network diagram:
These solutions are extremely straightforward to setup and maintain as opposed to creating a branch office inside a home office. It allows for added protection of all devices on the network without the headache of redesigning the entire home network.
If you have questions or concerns about remote IT and security, Thrive is here to help. CONTACT US TODAY!
Balancing Security and Productivity in Microsoft 365 During Times of Crisis – Part 2In our first blog of this series, we discussed how entitlement management in Azure Active Directory (Azure AD) Identity Governance creates Access Packages to control the scope and duration of access to groups, applications, and SharePoint sites. The two additional primary tools designed to control and audit access to company resources include Access Reviews and Privileged Identity Management. These three functions work synergistically to help keep a watchful eye on the collaboration space without impeding productivity.
In Part 2, we’ll discuss Access Reviews in detail. These are about auditing access to ensure previously-granted permissions are still appropriate and necessary.
Access Reviews
Setting up an Access Review
An Access Review is a scheduled, guided review of a group of Microsoft 365 users to help determine if their continued access to tenant resources is required. The review can be performed by multiple users and can be set to report on dispositions and, in some cases, automatically take action based on the dispositions set.
The first step of creating an Access Review is naming and describing its purpose. You will also set a start date and frequency if the intention is to perform the review periodically. Frequencies include weekly, monthly, quarterly, semi-annually, and annually. Occurrences can run indefinitely or can end by a specified date or after a number of occurrences. The review will also have an end date, after which the review will close and the “upon completion settings” will be applied.
Next, you determine who will be reviewed and who will be performing the review. The users to review can be Members of a Group or users Assigned to an Application on the tenant. Additionally, you can scope the review to include Guest users only or include all users. For Reviewers, you can select the Group’s owners, specific tenant users, or allow for self-review by the users. You can also associate the review with a Program (similar in concept to a Catalog for Access Packages) or choose the Default Program.
Next, we’ll set the “Upon completion settings,” which determine the action to take when the end date of the review is reached. The first choice is whether or not you’d like to auto-apply the results. With this setting enabled, any user whose disposition is to Deny access will automatically have their access removed upon the completion of the review. The second option is to determine what actions to take if reviewers don’t respond. These options include “No change,” “Remove access,” “Approve access,” or “Take recommendations.” The last option is based on Azure AD’s auto-set recommendations, which are primarily based on the last time the reviewed user utilized the system.
The final settings, under Advanced, include options to Show recommendations, Require a reason on approval, Mail notifications, and send Reminders to reviewers. All are currently enabled by default.
At this point, we are ready to start the review process. After pressing the Start button, the new Access Review will be added to the Access Reviews section within the Identity Governance module. The listing will include the name, the resource being reviewed, the status, and when it was created.
Clicking on the review will show an overview of the settings as well as a chart showing the status of the resources being reviewed. There are also pages to view the Results and the Reviewers. You can even send automated reminders for individual reviewers with the press of a button.
Performing a User Access Review
If the Mail Notifications option was set to Enabled, reviewers should receive an email with a link to begin their review. The email will have a hyperlinked button to take the user directly to the review page.
The Review page will show all relevant information, including who requested the review, when it is due by, the names of any other reviewers, and the progress made so far. It will also list each Resource being reviewed with their name, email address, Access Info (statement about whether they have recently logged in), and a recommended Action.
This list of users can be filtered based on Status (Reviewed, Not Yet Reviewed, All), Recommendation (Approve, Deny, All), or Action (Approved, Denied, Don’t Know, All). The reviewer can click on a single source to review or multi-select resources using the checkboxes, then press the “Review n user(s)” button. Reviewing resources opens a dialog with options for the disposition and comments. Actions can be Approve, Deny, or Don’t Know. The recommended action will be highlighted already. Don’t Know is useful if there are other reviewers who may have more insight or knowledge of the resource being reviewed.
Although all Resources may have been reviewed, the Access Review will stay open until its end date has been reached to allow for changes or other reviewers to provide input. If desired, a review can be manually stopped so action can be taken. This can be done by the user who originally set up the review using the Access Review overview screen. At that time, the actions will be automatically applied if the “Upon completion” setting’s “auto apply results to resource” is enabled, or the Apply Results button can be pressed if not.
The results of the review can be reviewed in the Results section of the Access Review.
Summary
Access Reviews in Azure AD Identity Governance provide a simple, consistent, and governed method of reviewing and controlling access to company tenant resources. By combining Access Reviews with Access Packages, administrators can tightly control who has access to which resources and ensure they retain the appropriate access only as long as required, all while maintaining agility and simplicity for users.
Next up: Privileged Identity Management. Configure just-in-time role escalation to implement a least-privileged security model for day-to-day operations while providing a rapid but governed path to escalated roles as required. Stay tuned!
Microsoft Teams vs. Zoom: Feature ComparisonFor those using Zoom, hopefully you are carefully reconsidering your use based on the recent security concerns exposed. In this blog, I’ll review the features of Zoom relative to Teams to make sure users are aware of what they get and are giving up with each platform in the event they could take advantage of features that allow them to communicate and work better.
Unlike a simple “review site,” I’ll address this from the view of a remote worker trying to get their job done and highlight the differences in functionality. This comparison is not intended to target the “social distancing cocktail party” crowd, though they may benefit from it as well.
Security
Zoom should essentially be treated like an “open conversation” until they get their security issues fixed. The platform is easy to hack and Zoom has previously admitted to collecting and sharing users’ personal data. If security is a real concern, I would not recommend Zoom for anything that you wouldn’t feel comfortable with any random person hearing.
Microsoft Teams does not use users’ data for anything other than to provide better services. The Microsoft 365 platform, in general, is designed around data loss prevention and information protection. However, it has more to protect as it is designed for persistent storage and collaboration on sensitive information, not just a simple video conferencing platform.
Web Conferencing
Zoom is simple — which is part of what made it vulnerable. It’s really just an audio/video conferencing tool. Zoom makes it easy to set up a virtual meeting, meet, chat, discuss, and be done. It also doesn’t require any advanced authentication or account management besides your name.
Teams has similar functionality, but may take a moment longer to set up a conference due to the intent of the platform. For example, Teams was built for integration with Microsoft 365, not as just a standalone product. Its scheduled meetings can be done from within its own calendar interface, which pulls directly from your Outlook/Microsoft calendar. You can also create meetings for Teams directly within Outlook and never open Teams.
Video Calls & Chat
When it comes to one-on-one or multi-person calls and chatting, Zoom is heavily built around the ID of a meeting or user, which is sent out for attendees to “join.” This system is designed to help users schedule meetings or start ad hoc video conferring meetings quickly, but it gets a lot less user-friendly when you want chat with someone, view their availability, jump on a video call, and add/remove people from that context.
Teams is designed around the individual, not the meeting. Chatting with someone, adding another person to a chat stream, sharing documents and notes, and collaborating on files are Teams’ main goal. It’s called “Teams” for a reason — it’s meant to let smaller groups of people work together.
It’s important to know that when sharing documents or data with people in ad hoc chats or video calls, that data is stored in OneDrive and available indefinitely if you want to continue working on it.
Since Teams is part of the overall Microsoft 365 ecosystem, all the data is searchable and discussion/chats can be sent out via email.
Telephone Integration
One of the biggest differences between Teams and Zoom is telephony. Zoom allows you to use a web link or a dial-in number for those joining from phones, but that’s pretty much where it leaves off. Teams has advanced integration with true calling capabilities because it was designed to replace telephone systems as well.
For example, with the proper licensing, I can call a telephone or join someone else’s conference via a traditional dial-in number with Teams, treating it like it was a telephone. In a voice meeting or chat, when I want to add a user, I can choose to call their telephone to dial them in. If Teams knows the user, it allows you to choose to invite them via telephone or their traditional online user account.
If you want the ability to add legitimate telephone capabilities (including receiving calls and voicemail), Teams is a much better choice.
Complete Internal Communication
Teams was created to be a complete internal communication hub — a context-based front-end to a lot of the work we perform on a daily basis. Its capabilities include: emailing, chatting, meeting, co-authoring documents, setting up calendar items, working on projects, and collaborating with both internal and external users on various secured topics and data.
Teams allows users to work with documents in secure channels, synchronize data to desktops, and co-author documents, adding workflow and automation to them as well. It also allows users to notify others when certain changes are made or reduce notifications on items they don’t need to hear about.
Teams provides for persistent notes integrated into meetings or work “locations” and @ mentions and hashtags to message people and groups specifically or allow them to search for tagged data and conversations.
One of the most important aspects of Teams is the ability to create multiple teams to work on specific content or projects and make sure those locations are private, secure, and audited, only accessible by the intended groups or users you define.
Platforms
Both applications are available on all typical platforms: PC, Mac, iOS, and Android. There isn’t a big distinction here in terms of availability, and both tools can be browser–based.
Price
Teams has a free version and the paid access starts with a $5 minimum licensing. However, most organizations already have Microsoft 365 Business Premium ($12.50) or E3 ($20) licensing, which includes a fully–functioning version of Teams at no additional cost. Prices increase if you want to use Teams as your office phone.
Zoom has a free version with some meeting time limitations, and their standard pricing is approximately $15-20 per month.
Bottom Line
The bottom line is that, in many ways, Teams and Zoom aren’t even comparable.
Security aside, if all you want to do is create a video/audio conference calls from a computer, Zoom is certainly easier to set up and use. Because the functionality is very specific and limited, there isn’t much else to do with it.
Teams, however, is designed to be an enterprise collaboration and productivity tool for business that do a lot more than calling and conferencing. The integration of documents, data, workstreams, permissions, and sharing all lend themselves to a deeper overall product. This product does come with some complexity and governance challenges that need to be addressed unless you simply want to use it for video conference calls.
If you want to do more with the tools you have and prefer software you can manage internally via settings, provisioning, and auditing, Teams is the clear choice for you.
Balancing Security and Productivity in Microsoft 365 During Times of Crisis – Part 1How Azure Active Directory (Azure AD) Identity Governance can assist your organization in responding quickly to new collaboration needs while maintaining security and governance.
The sudden onset of the COVID-19 pandemic sent much of the world into a frenzy. With businesses concerned for the safety and wellbeing of their employees and customers, and many governments strongly advising social distancing, the need to ramp-up the remote workforce went from a distant goal to a top priority almost overnight. One of the many groups greatly impacted by this new priority is the group of people responsible for collaboration platforms such as Microsoft 365. The need to quickly enable remote workers has made it seem necessary for many groups to ignore or postpone best practices and security considerations in favor of business continuity. Azure AD’s Identity Governance is one set of tools designed to help strike the balance between security and productivity, enabling quick turnaround on required resources while providing checks and balances to mitigate risk.
What is Azure AD Identity Governance?
Simply put, Azure AD Identity Governance is about “ensuring the right people have the right access at the right time.” More specifically, it is a set of 3 primary tools designed to control and audit access to company resources.
Entitlement Management is about creating Access Packages to control the scope and duration of access to groups, applications, and SharePoint sites.
Access Reviews are about auditing access to ensure previously granted permissions are still appropriate and necessary.
Privileged Identity Management covers the just-in-time elevation of tightly scoped roles to allow users to perform privileged operations when needed while maintaining lower permission levels during their day-to-day job functions.
These three functions work synergistically to help keep a watchful eye on the collaboration space without impeding productivity. Part 1 of this series will cover Entitlement Management in detail.
Entitlement Management
Setting up an Access Package
The key component of Entitlement Management is the creation of “Access Packages”. An Access Package is a collection of resources that users can be granted or request access to. Unlike simply adding users directly to Groups, these packages can control the duration, approval process, and periodic reviews of those assignments.
The first step of creating an Access Package is naming and describing its purpose. You can also create “Catalogs” to group multiple packages and delegate the administration of them to the appropriate users.
Next, you determine the Resource Roles that will be part of this package. It can be a combination of Groups/Teams, Applications, and SharePoint sites. In this case, we will grant access to the “COVID-19 Response Team” team in the Member role.
We’ll then move onto the Request process. Since this team may be made up of external collaborators who are unknown at this time, we’ll select “For users not in your directory”, and we’ll allow “All users (All connected organizations + any new external users)” to request access.
Since we are allowing as of yet unknown external users, we must require approval (other settings allow you to disable approval). We will set a specific user to provide approval, ensure a decision is made within 2 days, and force both the requestor and the approver to provide a justification for the access. We’ll enable this access request when we are ready to start requesting access.
Next, we will set the lifecycle of the access being provided. In this case, we will allow for 30 days of access, with the ability to request an extension (which also requires approval). If this was a longer duration or did not expire, we could also tie access to an Access Review, which we’ll cover later.
The last page will show a summary of all the choices to allow you to make any desired changes before creating the package.
Once the package is created, the browser will display a list of all Access Packages the current user has access to. From here, you can use the ellipsis to copy the link used to request access. This link can be emailed, put on a public site, or shared in any other traditional way.
Requesting Access
To request access via an Access Package, a user can use the link generated during the creation process. Once they sign in to the 365 tenant, they will be presented details of the access being requested. The user would then select the package and push the “request access” button.
From there, because we require justification, the user will be presented an area to provide the reason they are requesting access.
They will receive confirmation that their request was submitted.
Approving Access
After requesting access, the Approver will receive an Email with actions to Approve or Deny the request, and a summary of the information about the request.
Pressing the Approve or deny request button takes you to an Approvals page where you can approve or deny and provide the required justification.
Now that the request has been approved, the user should have access to the Team as a Member. When the expiration date is reached in 30 days, that access will be revoked unless an extension is requested.
Summary
Entitlement Management using Access Packages is a great way to govern access to resources such as Teams, SharePoint sites, and Applications, especially when external users are involved or the context of the access is limited to a specific timeframe. Users can request access as needed, owners can be empowered to grant access on demand, and removal of access can be automated to prevent lingering exposure of company information.
Next up: Access Reviews
Configure periodic, guided reviews of access to resources with suggestions based on login activity and automated resolution based on dispositions.
Thrive Named to the 2020 Tech Elite 250 by CRN®
Tech Elite 250 List Honors the Highest-Achieving IT Solution Providers in Vendor Certifications
FOXBOROUGH, Mass. – March 23, 2020 — Thrive announced today that CRN®, a brand of The Channel Company, has named Thrive to its 2020 Tech Elite 250 list. This annual list acknowledges the top tier of North American IT solution providers that have earned the highest number of advanced technical certifications from leading technology suppliers, scaled to their company size. These organizations have differentiated themselves as premier solution providers, earning multiple, top-level IT certifications, specializations, and partner program designations from the industry’s most prestigious technology providers.
Each year, The Channel Company’s research group and CRN editors work together to identify the most customer-centric technical certifications in the North American IT channel. Solution providers that have earned these elite designations — enabling them to deliver exclusive products, services, and customer support — are then selected from a pool of online applicants.
Thrive’s unique career development program, ThriveUniversity, facilitates the growth of its talented engineering staff. At every level Thrive’s engineers are equipped with the tools to pass security, networking and Cloud certifications that strengthen their capabilities and skillsets. The investment made in its employees in turn allows Thrive to provide its near 1,000 clients with innovative NextGen services.
“Solution providers that continue to pursue vendor certifications and extend their skill sets across various technologies and IT practices are proving their commitment to delivering the greatest business value to their customers through an incomparable level of service,” said Bob Skelley, CEO of The Channel Company. “Our CRN Tech Elite 250 list recognizes leading solution providers with expansive technical knowledge and esteemed certifications for exactly that reason.”
“Thrive engineers dedicate themselves to continued learning of best-of-breed products and solutions. From entry-level to senior management, we understand that each certification achieved strengthens the individual, the company and relationships with our technology partners,” stated Rob Stephenson, CEO of Thrive. “Whether it’s earning a CCNA, CISSP, Security+ or other certification, we are proud of the hard work that our talented staff puts in to advancing their technical capabilities.”
Coverage of the Tech Elite 250 will be featured in the February issue of CRN, and online at www.CRN.com/TechElite250.
About Thrive
Thrive is a leading provider of NextGen managed services designed to drive business outcomes through application enablement and optimization. The company’s Thrive5 Methodology utilizes a unique combination of its Application Performance Platform and strategic services to ensure each business application takes advantage of technology that enables peak performance, scale, and the highest level of security. For more information, visit thrivenextgen.com.
Thrive: LinkedIn, Twitter and Facebook
MEDIA CONTACT:
Stephanie Farrell – Director of Corporate Marketing
774.276.1521 | sfarrell@thrivenextgen.com
How To Ensure Secure Collaboration In Microsoft TeamsIn a time where remote work and distributed teams are more common than ever, ensuring your team can collaborate freely while keeping information secure is imperative. In this session, experts from Timlin Enterprises, LiveTiles, and Nucleus Cyber discuss what secure collaboration in Microsoft Teams entails and why it is important for your organization.
Watch the Webinar:
Meet the Speakers:
Ryan Thomas, CEO of Timlin Enterprises
Helping clients advance Office 365 capabilities to increase efficiency. Managed and professional services support migrations, administration, support, secure collaboration, automated business processes, and more.
Brad Hannes, Innovation Executive at LiveTiles
Defining the intelligent workplace. Giving developers and business users tools to easily create dashboards, employee portals, and corporate intranets that can be further enhanced by artificial intelligence and analytics features.
Steve Marsh, VP of Product at Nucleus Cyber
Provides a data-centric solution to secure collaboration. Delivers effective, intelligent security that minimizes data loss from internal misuse, rogue cloud environments, cyberespionage, and human error.
COVID-19 and Remote Work: Tips for Working and Collaborating RemotelyWith the current COVID-19 pandemic impacting almost everyone these days, many organizations, groups, and people in general are trying to find ways to maintain business continuity very quickly. Almost everything is more difficult when you have less time to make it happen. Since more than half of our team permanently works remotely and much of our business and customer efforts are completed remotely, we have been doing this for a while and thought the timing was right to share some of our tips and tricks with everyone out there.
Select a Technology / Tool
If you can standardize one tool for your company to use, it makes the effort a lot easier. Trying to use various different technologies to maintain continuity can be difficult. We are a Microsoft shop, so we use Microsoft Teams. Recently, Microsoft offered to give this tool away for free to help companies struggling with recent events.
In short, Microsoft Teams provides a platform for calling, video chatting, conferencing and recording, written and verbal discussion areas, file storage, document co-authoring, tagging, notifications, and more. Teams even allows for the compartmentalization of workstreams and security so you have context when collaborating in a certain location. Instead of one giant, open phone line, Teams helps streamline what you are working on and notifies when you people are working/discussing other topics.
Stop Emailing
This one is tough, but we recommend you think twice before emailing people within your organization. Email inboxes can be difficult to search properly, tedious to keep organized, and can make it hard for users to keep track of timelines and files.
In Microsoft Teams and other similar technologies, users can post documents, allow for collaboration on those documents, and determine who can and cannot edit those documents. If your team is working on a document without you, you can still hop in whenever you want to see the progress, add comments, or review updates. When you aren’t viewing the channel the document was added in, you won’t get bombarded or distracted as you might with email.
Reducing internal emails reduces clutter and distractions, and lets you choose the topics and virtual work locations that are important to you.
Talk to People
Schedule time to actively reach out and talk to your team throughout the day. We strongly suggest video chats (most laptops are equipped with a camera) so you can see their faces, look at their inflection, and remember there are human beings on the other side of these conversations. The biggest risk in remote work is the human isolation component. Now more than ever, with the recommendation to physically isolate, it is imperative for our mental health to stay connected, involved, and actively engaged in not just social activities, but also productive/work social activities.
Create Multi-Person Chats
A great way to encourage a positive online culture is to create and participate in chats between more than just two people. Go out of your way to respond, and others will follow suit. It’s inspiring to see people responding, helping, and moving the ball forward together in a way you can see (rather than just hoping it’s happening).
Consider an even wider audience chat instead of emails for major communication and news. Company-wide channels allow for responses and interaction from all the folks on the team — not just those in one department. Staying connected and cross-pollinating are the names of the game here.
Go one step further! Modern tools can securely invite people from outside your organization to participate with almost all the available activities for collaboration. Your contractors, vendors, support personnel, and partners will all be able to continue working with you — possibly better and more efficiently than they have up to until now.
Stay Notified
Since email, chat, and just about anything except a phone call or video chat are asynchronous, it’s important your technology notifies you of activities and changing information. In the old world, we called this “toast” because a small window in the lower right would pop up like a piece of toast, with just enough information on it so we knew what was going on, but not so much that had to interact or do anything about immediately unless we wanted to.
By using these notifications, you can continue working on your current efforts and glance quickly at notifications coming in. Emails and phone calls do not give you this level of anti-distraction capabilities.
Don’t Keep Documents Locally
Use the modern workplace tools to work on documents in a specific location where others can join in. When you get to the “can you take a look at this?” moment, you can easily ask and notify the group that you need some feedback. All work on the document(s) can be tracked, saved, and available for everyone at any time — without using ANY email.
Keep a History
One of our biggest issues with email is when we need to go back and look at a series of communications or activities and try to piece it back together. It feels like we must be a detective. Choose a technology that keeps a running tab of contextual communications and documents so all you have to do is go look, maybe scroll a bit, and can view any version of the document at any time. Then, when you add someone else to the workstream, you don’t have to try to find all the correct emails to forward to them in order to get them up to speed on the project — they can simply go look in the channel for themselves.
Logically Segment the Work
Don’t use an advanced tool and treat it just like email. A singular Teams setup with one big channel where all your work, chats, meetings, and interaction occur is essentially the same single steam firehose that email gives you, and is not valuable.
Break up your work into logical areas, departments, projects, teams, and efforts. Don’t choose so many that you must jump around for absolutely everything, find the balance that best suits your company’s needs. If you need assistance making this determination, our specialized consultants are here to help. We are willing to help at no cost to you during this pandemic, so don’t suffer because you didn’t budget for an emergency. We are happy to have a quick call with your team to pass along best practices and get your remote work started off on the right foot.
We hope this helps trigger some thoughts, ideas, and actions to make you and your organization more effective as you find you may have no choice but to work from home.
Stay safe,
Ryan Thomas
CEO, Timlin Enterprises