Sales: 0845 470 4001 | Support: 0845 230 6001 | Contact Form | NPS

10 top tips for working from home

Top-tips-working-from-home

Working from home can at times be compared to Marmite - you either love it or hate it. You have people that regularly work from home and find themselves far more efficient and productive doing so, and then you have people that are generally office-based and fear the loss of the structure of the day and the social interaction. 

With the majority of office workers now being asked to work from home, we've spoken to some of our regular home workers to get their 10 top tips for working from home, and how to get the most out of it and still feel connected to the wider team.

1. Do have a good working environment

Sitting up in bed or on the sofa sounds nice, but your back won't thank you as the day goes on. You should try to create a suitable working environment where you can sit up properly and have your laptop at the correct working height. Whether it's sat at the kitchen table or in your study, try and create an area clear of clutter. Why not try re-arranging some of your house plants to make your 'office' more inviting?

2. Do make healthy choices  

Stay hydrated - drink water and don't overdo it on the caffeine! Why not keep some fruit or healthy snacks nearby to reduce the temptation of biscuits, chocolates and crisps?  You'll thank yourself for it at the end of the day!

3. Do use video, it's good for all parties

Much of communication is non-verbal. Seeing your colleagues, clients or suppliers on video encourages interaction and engagement. But don't forget, everybody else can see you – make sure you're dressed appropriately and you've not just got out of the shower!

4. Do remember you can blur your background when on video calls

Using Microsoft Teams? You can blur your background on video calls, meaning that the pile of your kids' toys in the corner won't be visible. Handy right!? If you're using Zoom, there is a great feature that allows you to create a 'virtual background' – video call while on the moon, anyone?

5. Do remain focused and productive

Don't be tempted to start that new season on Netflix; plan your activities for the day in small sprints with what you want to achieve and deliver on it. This will help get you into a working rhythm and give you a sense of achievement.

6. Do schedule in 'virtual coffee breaks'

Why not schedule 20 minutes in the morning and afternoon to have a short social period with your team? You can all jump on a video call while you recharge your batteries with caffeine and talk about anything but work. Being able to keep some of the social side has a lot of benefits for all involved.

7. Do stay active and get away from your laptop

It's important that you look after your physical and mental health while working from home. Take the dog for a walk, or go for a run, at lunch. Take some scheduled breaks to do something different to help stay active and let your mind reset.

8. Do have some background noise if it helps you focus

If you're the sort of person that finds sitting in silence mind-numbingly boring, why not turn on the radio? Keep the volume low so you can still focus on your tasks and not get distracted. Just like in the office, if you find yourself drifting away from work due to the noise, make sure you refocus yourself.

9. Do have a routine

It's easy to slip into a 'lazy' way of working, potentially even be tempted to stay in your dressing gown all day, but it's important to still have a routine and set your mind up for the day. Try to keep the routine you had when going into the office - wake up, shower, have breakfast - you'll feel far more ready to tackle the day ahead.

And finally, the one that many people dread…

10. Don't worry about the kids/pets coming into the room

Cat jumped up on your keyboard? Your kid asking if they can have some crisps? We're all human and these things happen. Embrace them if they happen to you, and help others feel comfortable when it happens to them - everybody understands the situation that we find ourselves in. We'll all have stories to tell about 'those' moments in the coming weeks!

Now, most of these points will be stating the obvious for those of us that work from home on a regular basis. The challenges that we will all face in the coming weeks are some of the common challenges faced by regular home workers. Once this all dies down, and we are all able to return to the office environment, why not reach out to your colleagues that work from home to make sure they feel part of the team?

  3250 Hits

Coronavirus Lockdown: The Digital Workspace in action

blog-cover

With the current global situation, the past week has shown the importance of being able to create the Digital Workspace to provide flexible working solutions for your workforce. 

I decided to write a blog around how Microsoft's Teams, a Unified Communication as a Service (UCaaS) solution, has enabled my productivity to not slip despite the whole of my team now having to work from home thanks to Coronavirus.

  2195 Hits

Why successful Unified Communications must be addressed from both a technological and cultural perspective

b2ap3_large_press-release

Twitter, WhatsApp and other means of consumer service technology are becoming part and parcel of communicating at work alongside Unified Communications (UC) technologies. As a result, the boundaries between our work and personal lives are becoming increasingly blurred.

  2203 Hits

Cyber crime: ransomware attacks

Ransomware-banner

 Ransomware is malware that encrypts an individual's files so that they no longer have access to them, and subsequently demand payment for the files to be released. Usually the payment is asked to be made in an untraceable cryptocurrency form, such as Bitcoin. The most common way ransomware ends up on an individual's computers is through email spam, which individuals will click on and open.

Unfortunately, the files cannot be decrypted without a mathematical key which is only known by the cyber attacker, and the reason why many individuals tend to pay up. However, many find that despite paying the ransom, their files remain encrypted.

When looking at which countries were affected by ransomware attacks the most, the UK was found to have the highest percentage out of Europe:

  Figure 1: Cybercrime Tactics and Techniques: Ransomware Retrospective Report, Malwarebytes

Despite the NHS facing one of the worst ransomware attacks in May 2017 - the WannaCry ransomware attack - which cost the NHS £92m and caused more than 19,000 appointments to be cancelled (The Department of Health), this chart clearly highlights how organisations in the UK still need to invest more into their Cyber Security solutions to stay protected from ransomware attacks.

At Exponential-e, we help organisations that have been affected by ransomware attacks. Our Head of Cyber Consultancy, Mark Belgrove, discusses a real-life cyber attack in the video below, and shares how Exponential-ehelped mediate the situation. 

  4405 Hits

Phishing: attacks and prevention

Phishing-attacks

Phishing is the fraudulent use of electronic communications to try and obtain sensitive information, such as usernames, passwords and credit card details by posing as a legitimate institution. Phishing attacks attempt to get individuals to click on a malicious link and enter confidential information to steal their identity, funds or to be the first step in a serious cyberattack against an organisation.

  2782 Hits

The importance of securing your data - Part 2: Data Loss Prevention tools

The-importance-of-securing-your-data-Part-2-Data-Loss-Prevention-tools

All organisations store data, and regardless of whether it's a recipe or an algorithm, this data is an organisation's most prized asset, which is why hackers make it their target. The Cyber Security Breaches Survey 2019 from the Department for Digital, Culture, Media & Sport (DCMS) found that 32% of businesses identified cyber security breaches or attacks in the last 12 months, which have cost an average of £4,180 in lost data and assets

  2535 Hits

The future of CSOC: Threat Intelligence

The-future-of-CSOC-Threat-Intelligence

Organisations generate millions of system logs every day from the likes of servers, firewalls and network devices. Their ability to process, analyse and react to this information affects how they will manage any security risks and incidents. To help process this data, many organisations implement a Security Incident and Event Management (SIEM) system or outsource to a Cyber Security Operations Centre (CSOC) for their monitoring, which provides a real-time analysis of security alerts.

  3882 Hits

The importance of securing your data - Part 1: Privacy and compliance

The-importance-of-data-loss-prevention

Cybercriminals are only getting more cunning and skilful with their cyber attacks, which is bad news for organisations when it comes to meeting privacy and compliance regulations. There can be significant legal implications for organisations if their data is not secure and regulations are not met. For instance, since the GDPR (General Data Protection Regulation) came into effect in May 2018, data protection regulators have imposed 114 million euros (approximately 97 million pound) worth of fines under the GDPR regime (GDPR Data Breach Survey 2020 by DLA Piper).

  2268 Hits

Cyber breach prevention

cyber-security-advisory

With cyber breaches growing in volume and frequency (Carbon Black reported that 88% of UK organisations suffered a breach in 2018) you can guarantee that your organisation will be targeted by cybercriminals at some point.

  3553 Hits

Life Sciences & Technology - Part 2: Is DX at the top of Life Science organisations’ agenda?

Life-Sciences-Technology-Part-2-Is-DX-at-the-top-of-Life-Science-organisations-agenda

The short answer is yes - thousands of businesses are grappling with DX, however most do not consider themselves to be completely 'transformed' yet. Many of the largest Pharma organisations have launched initiatives and created entire departments focused on innovation, and are well on their way to operating in the same way an organisation which has completed its DX journey so far, is.

  3145 Hits

5 key considerations for Legal organisations planning Digital Transformation

5-key-considerations-for-Legal-organisations-planning-Digital-Transformation
The ramifications of Digital Transformation (DX) go far beyond technology. As George Westerman (author of Leading Digital: Turning Technology into Business Transformation) writes, DX "marks a radical rethinking of how an organisation uses technology, people and processes to fundamentally change Business performance." Any successful Transformation project will make a significant impact on an organisation's people, activity, process and culture - and all of these areas must be considered when planning a Transformation project.
  3293 Hits

How the landscape for remote working will never be the same again

How-the-landscape-for-remote-working-will-never-be-the-same-again
Over the last week, school leaders have risen to the challenges of the current crisis.It is a reminder of the responsiveness and resilience of our education system, and for those that are living on another planet (or wish they were at the moment!), the government is closing schools as of today to the vast majority of students. Children of key (critical) workers are still able to attend to ensure medical and transport staff can remain at work, but what does this mean for the other students?
  1833 Hits

Rising cyber security threats in manufacturing

Manufacturing-stories

Cyber professionals say that companies involved in the manufacturing industry are more exposed to cyber-attacks. This was revealed by a number of studies produced by the Manufacturers Alliance for Productivity and Innovation (MAPI). According to MAPI; 40% of manufacturing firms experienced a cyber-attack within the last year. Of those attacked, 38% of them suffered over $1 million in damages. 

  2172 Hits

Coronavirus Lockdown: A virtual NHS

Coronavirus_blog2_banner
The government recently sent letters to more than 65,000 retired doctors and nurses in England and Wales asking them to return to work to help the NHS cope with the coronavirus outbreak. Since then, 7,563 clinical staff have applied to come back to work, including 5,633 nurses and midwives, and 1,930 doctors to help support the hero frontline NHS workers caring for Covid-19 patients.
  7022 Hits

Playing your part - staying secure while remote working

Remote-Working-Checklist-Blog1-header

Now more than ever, digital security is a team effort, with staff at all levels of an organisation having an active part to play in keeping critical business data safe. With the outbreak of COVID-19, and an unprecedented volume of staff working from home, robust security policies and systems are no longer enough - each and every member of staff must consider security as a fundamental part of their developing remote working routines.

But what can each of us personally do to ensure our organisations maintain their usual standards of security for the duration of this crisis, without letting such measures detract from our day-to-day work? Here are a few starting points… 

Be prepared

If you're new to remote working, don't go in blind. Take the time to re-familiarise yourself with your company's security policies (particularly any new ones for home workers) and be sure to attend any training sessions that are on offer (as many organisations are rolling out remote training sessions for home workers, there are no excuses!). This will make the transition far smoother and allow you to stay focused on your work.


Secure your router

At Exponential-e, we always say that 'your Cloud is only as good as your network'. In the same way, your remote working solution is only as good as your router. As above, make sure its password is secure (especially if you've never changed its pre-set password!) and take any recommended security measures, both from your network provider and your IT team.

Check your passwords

This is a familiar refrain in the world of data security, but it always bears repeating. Familiarise yourself with current best practice regarding password creation (there are plenty of useful resources available online for this) and avoid reusing passwords. While memorising multiple passwords for each platform you use for work is certainly inconvenient, there are many excellent password manager tools available. Ask your IT team which one they would recommend, as your company may already require employees to use a specific one.


Enable updates

We all know how irritating requests to install updates on our personal devices can be, but in our current climate, it's more important than ever. More than just keeping your own devices secure, a single instance of malware could bring down your entire company network, so don't take any chances. Ensure you install all recommended updates, or – better yet – enable automatic updates. This will ensure your devices are always protected against the latest security threats. 

Ask!

As we've already mentioned several times in this post, if you are unsure about anything when it comes to data security, don't guess… ask the right person! In particular, your IT team will be more than happy to advise you about security best practice when home working, or alternatively, consider Exponential-e's Cyber Security Advisory service, which was created to provide a 'one stop shop' for any security-related concerns you may have.

In the meantime, download our Working from Home Checklist, which breaks down all the key elements of secure remote working.

  2265 Hits

Your launchpad - choosing the right tools for remote working

Remote-Working-Checklist-Blog2-header

In recent weeks, companies across the UK have found themselves transitioning to a remote workforce with little to no choice, despite the approach previously being treated as solely for limited or specific circumstances. There's no doubt that the rapid implementation of a whole new way of working presents considerable challenges, but as the Exponential-e teams who've partnered with organisations across a range of sectors to do so have demonstrated, it is very much achievable, provided you start with the right solutions in place.

In particular, consider the following…

A secure VPN

Virtual Private Networks have long been the benchmark solution for remote working, but with the spread of COVID-19, we are seeing companies moving from maintaining a few VPN licenses for specific instances to deploying them for their whole workforce. However, there's a good reason for this – if implemented correctly, it maximises security by encrypting all data you send through your company network. While you may require a cloud-based solution for specific applications, a quality VPN is an intelligent foundation for your day-to-day work.


A password manager

It's no secret that reusing passwords across different platforms presents a great risk of cyber criminals accessing corporate systems through guesswork. Nonetheless, it's still tempting for employees to do so due to the difficulty in keeping track of large numbers of unique passwords, especially when they need to be regularly updated, in line with internal security protocols. Fortunately, a password manager tool which integrates with your web browser makes it easy to keep your passwords secure, while still ensuring they are available when you need them. Ask your IT team if they recommend a specific one.


Automated backups

External backups are a key part of any effective business continuity and disaster recovery strategy, which should still be the case when you're working from home rather than the office. Your company is likely to have a system in place for this, particularly if you have already adopted a cloud-based strategy, so ensure you follow all guidelines when you begin remote working.

The right WFH solution

One of the biggest obstacles to remote working in the past has been the need to maintain continuity with existing business processes and systems, ensuring work can be conducted as normal, without compromising either security or efficiency. Fortunately, there are several ways of doing this, but it's important to be conscious of security when using such solutions, and always use the one recommended by your IT team. A proven, trusted platform like Exponential-e's Working from Home solution is ideal, allowing teams to continue using your company's preferred tools as normal, regardless of where they are logging on from. This will ensure a smooth transition to remote working for the entire workforce.


Two-factor or multi-factor authentication

Related to the above, two-factor or multi-factor authentication provides an extra level of peace of mind, by creating an extra obstacle for cyber criminals, even if one of your passwords is compromised. As password theft measures have become increasingly sophisticated over the years, this is no longer a 'nice to have' measure - it should be a standard part of your remote working systems and wider security policies.


Effective anti-virus protection

Viruses continue to evolve on a near-daily basis, and which means a robust anti-virus solution should still be your first line of defence and may even give you time to secure your infrastructure in the event of a password being compromised. Make sure an industry-standard solution is installed on all your devices and enable automatic updates.


The next steps...

Bear in mind that the technology and processes are only part of an effective remote working system. Establishing best practice amongst staff at all levels, ensuring chosen solutions are able to evolve with your organisation, and having the right partners to support your ongoing growth are all equally important. To find out more about how remote working can become a powerful tool for future business growth, download our Working from Home Checklist, which sets out our experts' proven strategies for making this a reality.
  1799 Hits

Stay Alert! Developing a secure home office

Remote-Working-Checklist-Blog3-header

Organisations around the world are moving closer and closer to establishing a new standard of best practice for remote working, with new tools and processes revealing themselves in response to the current pandemic. well for the future and our 'new normal', it's important that we treat our new home working environments with the same level of diligence we do our offices. If remote workers at all levels ensure the usual standards of security are maintained at all times, we will be able to focus on the range of ways home working can potentially act as a springboard for future growth.

Here are a few key points to bear in mind…

Always be suspicious of links

Cyber-crime is constantly evolving and shows no signs of slowing down during our current pandemic, which means we must all stay vigilant and exercise caution before clicking on any links we receive. Even if a link is from a legitimate-looking email address, check before clicking on it, as you can hover over it with your cursor to view the URL. If you have any concerns, alert your security team. In particular, watch out for 'working from home' scams, where fake websites offer 'home testing' kits or – in certain cases – cures for COVID-19. Avoid these at all costs, in order to keep both your personal bank account and your organisation's network secure.


Stay smart when sharing documents

When connecting to your company network from home, it's important that you ensure all the same security measures that would be utilised in the office are still in place, with all communications properly encrypted. Your IT team should always have an established set of procedures and tools for securely sharing documents – especially those that contain sensitive data – so be sure to revise this if you haven't already and avoid using any third-party platforms for this purpose. 


Lock your device!

Most professionals are already familiar with best practice whenever it comes to leaving devices unattended in the workplace, and in our current lockdown, it's unlikely any of us will accidentally leave work devices on public transport. But it's' essential that we do not let those practices slip while we're working from home. We've all heard funny stories in the news about when children get access to their parents' phones, but when our devices are connected to our business networks, it's important that they're 100% inaccessible to everyone except us. Even something as simple as a family member clicking on an unsecure website could lead to a costly security breach.



All these points might seem like a lot to consider on a day-to-day basis, but COVID-19 has helped drive a new burst of digital innovation in response to the need for secure, efficient remote working. There are now various solutions available to consolidate these measures into elegant, user-friendly solutions that make secure home working stress-free, such as Prisma Access. For more advice on putting all these points into practice, be sure to download our Working from Home Checklist, which guides you through both best practice and choosing the right tools.
  2155 Hits

Adversity into opportunity: transforming the legal sector’s view of IT

legal-blog-apr20 Adversity into opportunity: transforming the legal sector’s view of IT
It's impossible to overstate the impact COVID-19 has had on businesses throughout the UK, forcing organisations to rethink their approaches to work, and – in many cases – redesign their infrastructures to accommodate the Government's new requirements for remote working. The legal sector is no different, but has been hit especially hard, due to the preponderance of cumbersome legacy systems that need to be migrated and updated, and a generally slow rate of digital transformation across the entire industry.
  3658 Hits

Will COVID-19 turbocharge how Charities manage their Cyber Security Infrastructure?

Covid-charity Will COVID-19 turbocharge how Charities manage their Cyber Security Infrastructure?
A number of charities have their IT foundations built on historical infrastructure and systems which are hard to appropriately protect. Within the current climate, it is now vital that all solutions are accessible remotely, ensuring employees do not need to travel into offices. However, where does this leave cyber security?

The Department for Digital, Culture, Media and Sport found that only 32% of charities have performed a cyber-risk assessment in the last 12 months (The Cyber Security Breaches Survey 2019), meaning there are a significant number of charities that could potentially not understand all of their vulnerabilities. The cyber landscape is constantly evolving, and it is vital that all charities are aware of their risks and vulnerabilities so that the appropriate control measures can be put in place to protect them. Throughout my years of experience, I have found that if an organisation does not fully understand its risks, money is often wasted, and controls may not be as effective as they need to be.

At Exponential-e, most of our customers have set up VPN connections for their remote workers or virtual desktops for employees that aren't provided with laptops. However, there is still the potential risk for an uncontrolled, infected endpoint to unknowingly distribute malware into an organisation and consequently, take down all systems. Several organisations have been affected by ransomware attacks recently, which have all originated from a malicious phishing email. In order to reduce the success rate of phishing attacks, all users need to be educated to be able to identify a phishing email, and to know how to react effectively in order to stop them, see my Top Tips for Working From Home video for more information.

Increasingly, charities are reliant on online services – donation platforms and login pages – and consequently, many charities are falling victim to cyberattacks. Smaller charities are often more vulnerable, since they have less awareness of cyber security as a whole and are naïve to the risks they may face from a cyberattack. The National Cyber Security Centres' (NCSC) 'Cyber Threat Assessment: UK Charity Sector', identified that the most common vector for cyberattacks against charities were phishing emails; fraudulent emails, containing links to fraudulent websites. These impersonation attacks are dangerous, and often lead to malicious software making their way into IT systems. If a charity loses access to their online services, it could result in an existential threat to their survival – from the ensuing reputational damage and the prevention of service delivery.

Being one of the founding members and a current board member of The Cyber Helpline, a free, confidential helpline for individuals who have fallen victim to cyber crime. I use my expertise to help individuals contain, recover and learn from cyber attacks. The Cyber Helpline was designed and developed in the cloud, and we have continuously made sure that the infrastructure is always protected and tested each month. The founding members of The Cyber Helpline have come from the cyber security industry, subsequently we have been able to ensure that the security by design was in place from day one. 

This service uses chat-bot technology, which was developed to help triage any incidents. When we first started out, we were worried that we might not have adequate resources to cope with the quantity of incidents occurring, so the use of this technology helped in addressing this risk. Our chat-bot can ask relevant questions, to help us identify what the incident is in relation to, and which classification it falls into, so that we can react accordingly. If an incident could cause harm to an individual, it is quickly escalated through to a volunteer or manager, to ensure it is handled appropriately. In other cases, when the incident can be resolved through following a set of step-by-step instructions, we provide the individuals with an appropriate guide, so that they are able to help themselves. Our volunteers use their own systems to access the cloud environment, but we train them thoroughly as part of the on-boarding process. Additionally, all our volunteers have anti malware solutions in place, to protect their systems, and are able to accurately identify phishing emails.

There are still many charities that are not able to employ a Chief Information Security Officer (CISO) and have yet to act and seek external help to mitigate the risks posed by cyberattacks. Even for those who have received external help with their cyber security, it is still crucial for them to stay on top of the evolving threat landscape. Accepting advice and guidance is important in preventing the damaging effects of cybercrime.

At Exponential-e, we welcome the opportunity to help any charity needing assistance with cyber security questions or solutions. Our Cyber Security team exists to support and educate our customers, especially those who are in the vulnerable position of knowing that cyber security is a threat, but are less aware of the solutions required to protect their organisations against it. We are consistently on hand when required, to supply knowledge and give support to our customers, all whilst maintaining and renewing our own knowledge base, to remain up-to-date with current threats in the industry and how best to mitigate against them. We abide by integrity, reliability and perseverance, in order to provide the best cyber security solutions for our customers' individual requirements.

We are currently hosting a series of webinars around different areas of cyber security, click here for more details.

  3134 Hits

Three steps to more secure employee passwords on World Password Day

Three-steps-to-more-secure-employee-passwords-on-World-Password-Day

Passwords are often more associated with individual and consumer cyber security, but they are an essential part of an organisation's overall security posture. For example, you wouldn't leave the windows open overnight as this would allow easy access into the building for thieves. In the same way, a weak password offers cyber attackers easy access to your corporate infrastructure, after which they can use these credentials to escalate permissions until they granted themselves administration privileges, at which point the risk of financial and reputational damage becomes truly serious!

  2241 Hits