Remote Working and the Coronavirus

Expert Insight

Technologies for Remote Working

As the UK prepares to defend itself against the developing COVID-19, commonly known as Coronavirus, outbreak, businesses across the country have begun to implement remote working policies as a means to tackle the spread.

As an IT provider, specialising in cloud technology, we recommend all office-based organisations prepare and test their current technology systems, in the event of an enforced containment period by the UK government. By asking all employees to work from home for one day, this will allow you to check for any possible flaws in your current remote working system, so you can ensure your workforce are equipped and cyber safe. We advise you consider the following:

best it support company

Ensuring that devices are fit-for-purpose:

The devices we use in our leisure time aren’t always as practical as those we use in the workplace. Those who are accustomed to using keyboards and multiple screens in the workplace, for example, may struggle to work as swiftly and efficiently on a laptop or touchscreen device. To ensure working remotely is successful, companies may need adapt their processes and adopt new technology to support device integration.

best cyber security company


The Security of any device used to facilitate business, needs to be considered – are you happy for company data and documents to be accessed from personal devices? And if so, what steps are you taking to ensure that those devices are adequately protected using up to date anti-malware and firewalls.

Where possible, we would recommend that customers provide staff with company-owned devices to access company data.

All corporate devices should have high quality anti-malware and antivirus software installed. However, with an increase in phishing attacks, targeting those interested or concerned about the coronavirus, you should implement further methods of protection, and the following should be a consideration:

Boundary firewalls and internet gateways. Check the configuration and use of appropriate firewalls and gateways to protect devices by monitoring traffic and blocking potentially harmful traffic.

Secure settings and configuration. Use the most secure settings for devices and software, such as strong passwords and multi factor authentication.

Access control. It is an unfortunate fact that human error is a major contributor to security breaches and so long as systems have users, there will be security risks. Whilst human error cannot be mitigated entirely, controlling access to company data through user accounts offering different levels of access to software and data does limit the impact of breaches.

Protection from viruses and malware. Use appropriate and strong malware protection, such as Defender for Windows.

Patch management. Organisations that are running older versions of software aren’t benefiting from the most up-do-date security protection, which means that they may be vulnerable to security risks for which patches are already available.

Employee Awareness. Phishing e-mails are one of the most effective ways for cyber criminals to gain access to your personal information, both in the workplace and at home, and they are currently using the Coronavirus to their advantage. All a user needs to do is open the e-mail, input credentials or click a link, and a malware attack is launched. So we advise you run a fake email test internally to measure how many people fall victim.

Following this, you should advise your team to look out for the following suspect traits:

  • Is the message sent from a public e-mail domain, like a Hotmail or G-mail account?
  • Is the message sent from a user you know, but the language is suspect?
  • Do any links contain mismatched URLs?
  • Does the email contain any unsolicited attachments.
  • Is the email requesting personal information?

These e-mails will be looking to achieve two things, either gain your credentials, or install software to steal your data. Both are extremely harmful, so you need to be vigilant during this time.

cloud telephony

Business Technology:

Ensuring you have the right programmes and systems accessible to your employees is imperative, and cloud based solutions are best placed to support those who need to work remotely. As A Microsoft Partner, we know Microsoft 365 is best placed to achieve this, and it includes a plethora of applications outside of the basics, like Word and Excel. We think the essentials for business are:

Microsoft Teams: This application allows employees to connect regardless of where they are, it’s a cloud based messaging service that supports group chats, calls and web conferencing, and it’s not just available on desktop, it can be used to facilitate calls on your mobile too. In order to ensure your business continues to run, communication will be key and a solution like Teams will be crucial.

SharePoint Online: As a basic concept it’s an intranet for staff collaboration and file storage. Using this application will allow your team to upload and access the latest company documents, all in one area. Our customers already using SharePoint with company owned laptops have found themselves able to work from home – or anywhere else – just as effectively as when they are in the office

Intune Device Manager: If using personal devices is required, this app allows you to protect business confidential data, while granting employees permission on the devices and apps they choose. Although it’s not a programme your employees be using directly, Intune will give you peace of mind if any equipment goes missing; with this app you can track, monitor and wipe company data from personal devices remotely if required – leaving the user’s personal data and settings intact.

OneNote: This platform enables remote workers to stay organised, share meeting notes and agendas, and collaborate with other team members. It’s also updated in real time, so great if other colleagues need to check for working updates.

Microsoft Planner: This application facilitates group working, and allows users to assign and organise work. In essence, tasks are streamlined, assigned deadlines and allocated users. This one will be great to keep track of projects, individual workloads and how much is being achieved.


Internet Connection:

Can your employees’ wireless network and internet connection cope with the additional demands of extra devices running numerous complex applications? Expectations around speed and reliability, plus extra bandwidth required from mobile devices, means their current wireless network and / or Internet connection may struggle to deliver the performance they need. In this case, it’s sensible to also have a backup solution. It’s common to now have unlimited data on mobiles plans, so it’s worth noting these can be used to hotspot additional devices.

Once employees are equipped with the right devices, request they run a speed test to check the quality of their connection is sufficient. We recommend you do this via Speedtest.

If you have any concerns or questions about the current state of your business’s cyber security, or further information on working remotely, please contact us here.

Join Our Newsletter