Sales: 0845 470 4001 | Support: 0845 230 6001 | Contact Form | NPS

Your launchpad - choosing the right tools for remote working

Remote-Working-Checklist-Blog2-header

In recent weeks, companies across the UK have found themselves transitioning to a remote workforce with little to no choice, despite the approach previously being treated as solely for limited or specific circumstances. There's no doubt that the rapid implementation of a whole new way of working presents considerable challenges, but as the Exponential-e teams who've partnered with organisations across a range of sectors to do so have demonstrated, it is very much achievable, provided you start with the right solutions in place.

In particular, consider the following…

A secure VPN

Virtual Private Networks have long been the benchmark solution for remote working, but with the spread of COVID-19, we are seeing companies moving from maintaining a few VPN licenses for specific instances to deploying them for their whole workforce. However, there's a good reason for this – if implemented correctly, it maximises security by encrypting all data you send through your company network. While you may require a cloud-based solution for specific applications, a quality VPN is an intelligent foundation for your day-to-day work.


A password manager

It's no secret that reusing passwords across different platforms presents a great risk of cyber criminals accessing corporate systems through guesswork. Nonetheless, it's still tempting for employees to do so due to the difficulty in keeping track of large numbers of unique passwords, especially when they need to be regularly updated, in line with internal security protocols. Fortunately, a password manager tool which integrates with your web browser makes it easy to keep your passwords secure, while still ensuring they are available when you need them. Ask your IT team if they recommend a specific one.


Automated backups

External backups are a key part of any effective business continuity and disaster recovery strategy, which should still be the case when you're working from home rather than the office. Your company is likely to have a system in place for this, particularly if you have already adopted a cloud-based strategy, so ensure you follow all guidelines when you begin remote working.

The right WFH solution

One of the biggest obstacles to remote working in the past has been the need to maintain continuity with existing business processes and systems, ensuring work can be conducted as normal, without compromising either security or efficiency. Fortunately, there are several ways of doing this, but it's important to be conscious of security when using such solutions, and always use the one recommended by your IT team. A proven, trusted platform like Exponential-e's Working from Home solution is ideal, allowing teams to continue using your company's preferred tools as normal, regardless of where they are logging on from. This will ensure a smooth transition to remote working for the entire workforce.


Two-factor or multi-factor authentication

Related to the above, two-factor or multi-factor authentication provides an extra level of peace of mind, by creating an extra obstacle for cyber criminals, even if one of your passwords is compromised. As password theft measures have become increasingly sophisticated over the years, this is no longer a 'nice to have' measure - it should be a standard part of your remote working systems and wider security policies.


Effective anti-virus protection

Viruses continue to evolve on a near-daily basis, and which means a robust anti-virus solution should still be your first line of defence and may even give you time to secure your infrastructure in the event of a password being compromised. Make sure an industry-standard solution is installed on all your devices and enable automatic updates.


The next steps...

Bear in mind that the technology and processes are only part of an effective remote working system. Establishing best practice amongst staff at all levels, ensuring chosen solutions are able to evolve with your organisation, and having the right partners to support your ongoing growth are all equally important. To find out more about how remote working can become a powerful tool for future business growth, download our Working from Home Checklist, which sets out our experts' proven strategies for making this a reality.
  1899 Hits

Stay Alert! Developing a secure home office

Remote-Working-Checklist-Blog3-header

Organisations around the world are moving closer and closer to establishing a new standard of best practice for remote working, with new tools and processes revealing themselves in response to the current pandemic. well for the future and our 'new normal', it's important that we treat our new home working environments with the same level of diligence we do our offices. If remote workers at all levels ensure the usual standards of security are maintained at all times, we will be able to focus on the range of ways home working can potentially act as a springboard for future growth.

Here are a few key points to bear in mind…

Always be suspicious of links

Cyber-crime is constantly evolving and shows no signs of slowing down during our current pandemic, which means we must all stay vigilant and exercise caution before clicking on any links we receive. Even if a link is from a legitimate-looking email address, check before clicking on it, as you can hover over it with your cursor to view the URL. If you have any concerns, alert your security team. In particular, watch out for 'working from home' scams, where fake websites offer 'home testing' kits or – in certain cases – cures for COVID-19. Avoid these at all costs, in order to keep both your personal bank account and your organisation's network secure.


Stay smart when sharing documents

When connecting to your company network from home, it's important that you ensure all the same security measures that would be utilised in the office are still in place, with all communications properly encrypted. Your IT team should always have an established set of procedures and tools for securely sharing documents – especially those that contain sensitive data – so be sure to revise this if you haven't already and avoid using any third-party platforms for this purpose. 


Lock your device!

Most professionals are already familiar with best practice whenever it comes to leaving devices unattended in the workplace, and in our current lockdown, it's unlikely any of us will accidentally leave work devices on public transport. But it's' essential that we do not let those practices slip while we're working from home. We've all heard funny stories in the news about when children get access to their parents' phones, but when our devices are connected to our business networks, it's important that they're 100% inaccessible to everyone except us. Even something as simple as a family member clicking on an unsecure website could lead to a costly security breach.



All these points might seem like a lot to consider on a day-to-day basis, but COVID-19 has helped drive a new burst of digital innovation in response to the need for secure, efficient remote working. There are now various solutions available to consolidate these measures into elegant, user-friendly solutions that make secure home working stress-free, such as Prisma Access. For more advice on putting all these points into practice, be sure to download our Working from Home Checklist, which guides you through both best practice and choosing the right tools.
  2269 Hits

Adversity into opportunity: transforming the legal sector’s view of IT

legal-blog-apr20 Adversity into opportunity: transforming the legal sector’s view of IT
It's impossible to overstate the impact COVID-19 has had on businesses throughout the UK, forcing organisations to rethink their approaches to work, and – in many cases – redesign their infrastructures to accommodate the Government's new requirements for remote working. The legal sector is no different, but has been hit especially hard, due to the preponderance of cumbersome legacy systems that need to be migrated and updated, and a generally slow rate of digital transformation across the entire industry.
  3805 Hits

Will COVID-19 turbocharge how Charities manage their Cyber Security Infrastructure?

Covid-charity Will COVID-19 turbocharge how Charities manage their Cyber Security Infrastructure?
A number of charities have their IT foundations built on historical infrastructure and systems which are hard to appropriately protect. Within the current climate, it is now vital that all solutions are accessible remotely, ensuring employees do not need to travel into offices. However, where does this leave cyber security?

The Department for Digital, Culture, Media and Sport found that only 32% of charities have performed a cyber-risk assessment in the last 12 months (The Cyber Security Breaches Survey 2019), meaning there are a significant number of charities that could potentially not understand all of their vulnerabilities. The cyber landscape is constantly evolving, and it is vital that all charities are aware of their risks and vulnerabilities so that the appropriate control measures can be put in place to protect them. Throughout my years of experience, I have found that if an organisation does not fully understand its risks, money is often wasted, and controls may not be as effective as they need to be.

At Exponential-e, most of our customers have set up VPN connections for their remote workers or virtual desktops for employees that aren't provided with laptops. However, there is still the potential risk for an uncontrolled, infected endpoint to unknowingly distribute malware into an organisation and consequently, take down all systems. Several organisations have been affected by ransomware attacks recently, which have all originated from a malicious phishing email. In order to reduce the success rate of phishing attacks, all users need to be educated to be able to identify a phishing email, and to know how to react effectively in order to stop them, see my Top Tips for Working From Home video for more information.

Increasingly, charities are reliant on online services – donation platforms and login pages – and consequently, many charities are falling victim to cyberattacks. Smaller charities are often more vulnerable, since they have less awareness of cyber security as a whole and are naïve to the risks they may face from a cyberattack. The National Cyber Security Centres' (NCSC) 'Cyber Threat Assessment: UK Charity Sector', identified that the most common vector for cyberattacks against charities were phishing emails; fraudulent emails, containing links to fraudulent websites. These impersonation attacks are dangerous, and often lead to malicious software making their way into IT systems. If a charity loses access to their online services, it could result in an existential threat to their survival – from the ensuing reputational damage and the prevention of service delivery.

Being one of the founding members and a current board member of The Cyber Helpline, a free, confidential helpline for individuals who have fallen victim to cyber crime. I use my expertise to help individuals contain, recover and learn from cyber attacks. The Cyber Helpline was designed and developed in the cloud, and we have continuously made sure that the infrastructure is always protected and tested each month. The founding members of The Cyber Helpline have come from the cyber security industry, subsequently we have been able to ensure that the security by design was in place from day one. 

This service uses chat-bot technology, which was developed to help triage any incidents. When we first started out, we were worried that we might not have adequate resources to cope with the quantity of incidents occurring, so the use of this technology helped in addressing this risk. Our chat-bot can ask relevant questions, to help us identify what the incident is in relation to, and which classification it falls into, so that we can react accordingly. If an incident could cause harm to an individual, it is quickly escalated through to a volunteer or manager, to ensure it is handled appropriately. In other cases, when the incident can be resolved through following a set of step-by-step instructions, we provide the individuals with an appropriate guide, so that they are able to help themselves. Our volunteers use their own systems to access the cloud environment, but we train them thoroughly as part of the on-boarding process. Additionally, all our volunteers have anti malware solutions in place, to protect their systems, and are able to accurately identify phishing emails.

There are still many charities that are not able to employ a Chief Information Security Officer (CISO) and have yet to act and seek external help to mitigate the risks posed by cyberattacks. Even for those who have received external help with their cyber security, it is still crucial for them to stay on top of the evolving threat landscape. Accepting advice and guidance is important in preventing the damaging effects of cybercrime.

At Exponential-e, we welcome the opportunity to help any charity needing assistance with cyber security questions or solutions. Our Cyber Security team exists to support and educate our customers, especially those who are in the vulnerable position of knowing that cyber security is a threat, but are less aware of the solutions required to protect their organisations against it. We are consistently on hand when required, to supply knowledge and give support to our customers, all whilst maintaining and renewing our own knowledge base, to remain up-to-date with current threats in the industry and how best to mitigate against them. We abide by integrity, reliability and perseverance, in order to provide the best cyber security solutions for our customers' individual requirements.

We are currently hosting a series of webinars around different areas of cyber security, click here for more details.

  3241 Hits

Three steps to more secure employee passwords on World Password Day

Three-steps-to-more-secure-employee-passwords-on-World-Password-Day

Passwords are often more associated with individual and consumer cyber security, but they are an essential part of an organisation's overall security posture. For example, you wouldn't leave the windows open overnight as this would allow easy access into the building for thieves. In the same way, a weak password offers cyber attackers easy access to your corporate infrastructure, after which they can use these credentials to escalate permissions until they granted themselves administration privileges, at which point the risk of financial and reputational damage becomes truly serious!

  2385 Hits

Delivering resilient, high-performance connectivity for global broadcasts

Delivering-resilient-high-performance-connectivity-for-global-broadcasts

Global broadcasts place incredible demands on infrastructure, which must offer the performance and resilience required to accommodate the anticipated spikes in viewership. Exponential-e has worked closely with a number of world leaders across the broadcasting and media sector, providing fully integrated solutions that ensure their connectivity is of the very highest quality, freeing their own teams to focus on the broadcast itself, safe in the knowledge that they can completely depend on their technological foundation, no matter how many viewers around the world tune in.

  2121 Hits

The true cost of a poor customer experience, and what it means for your contact centre

The-true-cost-of-a-poor-customer-experience-and-what-it-means-for-your-contact-centre

Over the course of the past year, the contact centre has been changed forever, with social distancing requirements meaning that familiar methods of face-to-face contact are now unavailable. In light of these shifts, social media, video and email contact are now regularly utilised as the primary channels for customer queries – a trend that we have seen on the rise for some years now. Between March and November 2020, we saw a significant update in the use of online channels, with 54% of organisations reporting an increase in email contact, 52% reporting an increase in social media, and 65% reporting an increase in the use of web chat.

  2724 Hits

The finance sector rises to meet its latest cyber security challenges

The-finance-sector-rises-to-meet-its-latest-cyber-security-challenges-header

The finance sector is required to have one of the most sophisticated cyber security postures in the world, with bureaus, banks, finance companies and insurers working closely with their technology partners to ensure sensitive financial data is managed, stored and transferred, with a stringent range of international security standards that must be adhered to at all times. However, cyber criminals have demonstrated repeatedly that they are constantly working to breach even the most sophisticated security ecosystems, devising new ways to exploit both technological vulnerabilities and human error.

  2444 Hits

Are you ready for the next phase of Microsoft Teams… True Unified Communications?

Are-you-ready-for-the-next-phase-of-Microsoft-Teams-True-Unified-Communications-Blog-Post-Header

Microsoft Teams has been in the ascension for some time now, rising exponentially in popularity throughout 2020, to the point it is now the default internal communications tool for many organisations, with the distributed workforce utilising it to effectively collaborate with colleagues on a day-to-day basis.

  1917 Hits

Creating new workspaces for the distributed workforce’s ‘liquid footprint’

Creating-new-workspaces-for-the-distributed-workforces-liquid-footprint

With the flexible office model slowly but surely supplanting the traditional working environments in favour of dynamic co-working spaces for a number of years now, we have seen many organisations reconsider the way they think about commercial real estate.

  2498 Hits

IT infrastructure for the UK media sector

IT-infrastructure-for-the-UK-media-sector

The media sector is amongst the most dynamic and rapidly evolving in the UK, with audiences consuming higher volumes of content than ever before, across a tremendous range of platforms. This means its IT infrastructure must reflect that, ensuring data-intensive content can be made available on-demand, both online and offline.


A secure, high-performance network is essential, as is a robust business continuity strategy and scalable, cost-effective storage.

An intelligently designed and implemented IT infrastructure, utilising cutting-edge Cloud technology, will not only ensure a great end user experience, but drive creativity and collaboration between teams across multiple sites, even when remote working. This way, the UK's media sector will be perfectly placed to retain its stellar reputation around the world. Exponential-e utilise our full range of solutions to ensure this success, acting as a trusted partner for numerous UK media organisations, as these case studies will illustrate.

  2419 Hits

Keeping our schools cybersafe throughout lockdown

Keeping-our-schools-cybersafe-throughout-lockdown

The past year has challenged the UK's education sector in ways that would previously have been inconceivable, with children learning from home the majority of the time since March.

  2886 Hits

Tailored IT solutions for the hospitality & leisure sector

Tailored-IT-solutions-for-the-hospitality-leisure-sector

The way the hospitality & leisure industry interacts with guests is constantly evolving, with cutting-edge technology offering new channels for everything from making bookings, to checking in, ordering additional services and entertainment, and billing.


This type of multi-channel service delivery must be underpinned by a secure, scalable and cost-effective IT infrastructure, which will allow hospitality & leisure organisations to pivot in response to an ever-evolving landscape, optimising application performance, protecting guests' sensitive data, and taking advantage of new channels for marketing and gathering feedback - all while retaining the all-important human touch.

Putting all this into practice requires a successful digital transformation process and the ongoing support of a trusted IT partner – a role Exponential-e is perfectly placed to fulfil.

These case studies offer real-world examples of how Exponential-e has helped organisations across the UK's hospitality & leisure sector affect their own digital transformations, ensuring they can continue to offer their guests incredible experiences, every time.

  3381 Hits

Exponential-e’s managed service desk: a new, more flexible way to offer your customers world-class, 24/7 support

Exponential-e-s-managed-service-desk-a-new-more-flexible-way-to-offer-your-customers-world-class-24-7-suppor_20210510-143741_1

Throughout these unprecedented times, many Resellers and Systems Integrators have been forced to furlough team members or reduce headcount, creating leaner operations in order to weather the economic downturn. But as we now approach an economic return and ramp up our trading levels, these resourcing gaps can limit the services that resellers can take to market.

  2807 Hits

During Mental Health Awareness Week 2021, take care of your own wellbeing… and that of your employees

On-Mental-Health-Day-2021--take-care-of-your-own-wellbeing-and-that-of-your-employee_20210512-160152_1

To say the past year has been challenging would be an understatement. But as we look back on the challenges our organisations have overcome - and the ones we expect to face going forward - it's important to not lose sight of the fact that people are the lifeblood of any company.

  2241 Hits

Why is Object Storage the right solution to underpin your Artificial Intelligence, Machine Learning, Big Data, and IoT analytics strategies?

Why-is-Object-Storage-the-right-solution-to-underpin-your-Artificial-Intelligence-Machine-Learning-Big-Data-and-IoT-analytics-strategies

Selecting the right storage architecture is essential for organisations that are leveraging Artificial Intelligence (AI), Machine Learning (ML), Big Data and IoT analytics. For example, AI applications that involve scientific and medical research create and interact with numerous large files, and therefore need a storage system that can scale to a petabyte level, with zero restrictions. Similarly, ML applications and Big Data projects require a scalable, cost-effective storage solution to accommodate the high volumes of data that will be produced. This raises the question of which storage solution enterprises should use to underpin their overall analytics strategies.

  3265 Hits

Why you can’t afford to neglect advisor wellbeing in the new contact centre

Why-you-cant-afford-to-neglect-advisor-wellbeing-in-the-new-contact-centre

Even as the end of lockdown approaches, it is clear that hybrid working is here to stay, with organisations utilising remote and office-based working on a flexible basis, in order to combine the advantages of both.

  4650 Hits

Understanding failure demand and its impact on your contact centre

Understanding-failure-demand-and-its-impact-on-your-contact-centr_20210812-143436_1

Failure Demand: "Demand caused by failure to do something or do something right for the customer"
Seddon, 2003

  6089 Hits

Two years on… How has Architects Declare affected the AEC sector in the UK?

Two-years-on-How-has-Architects-Declare-affected-the-AEC-sector-in-the-UK

In July of 2019, Exponential-e hosted a roundtable at The Ritz London, bringing together 18 top UK architects to discuss topical issues across the sector and sharing views on the matters at hand. One of the topics raised was the newly launched Architects Declare manifesto and its 11-point plan for tackling climate change and biodiversity loss. From 16 founding signatories, word spread like wildfie and within weeks, hundreds of practices - large and small - signed up, signalling that our architects were ready commit to operating in a greener, more sustainable manner.

  2687 Hits

Why learning and development have always been fundamental parts of life at Exponential-e

Why-learning-and-development-have-always-been-fundamental-parts-of-life-at-Exponential-e

Attracting top talent is just part of the picture when it comes to building a thriving, successful organisation. If employees are to achieve their full potential in both their professional and personal lives, it is essential to nurture their talents and cultivate the skills that will help them progress along their chosen career paths. 

  2438 Hits