If you’ve kept your business running with employees working from home, you’re probably through the equipment setup frenzy. And now you’ve hit the working-out-the-bugs phase. This post features tech-related FAQs we’ve been answering for clients (and friends…and relatives…).
My TechGen staff and I are also working from our homes. We empathize with those of you striving to serve your clients–who themselves may be in serious situations–while managing the technical challenges of a remote operation.
Here are some ideas about how to do it better (for more tips about running your business remotely, read my previous post):
1. Why are Some Programs Running so Slow on my VPN (Virtual Private Network), and Why Does the VPN Disconnect So Often?
This is usually caused by slow, spotty home internet, too much VPN traffic, and applications not designed to work on a VPN.
- Slow/spotty internet connection: Compared with your office, your home’s internet connection speed might be MUCH slower. Also, typical hiccups in internet reception can disconnect or slow your VPN. Other speed killers: too much distance between your computer and wifi router, and other people in your house using the internet (such as students doing distance learning).
- Apps not designed for VPN: Some applications like QuickBooks Pro and CAD software are not designed to work over a VPN (they’re trying to move too much data over a slow connection).
- Too much VPN traffic: The VPN may not be able to handle most or all of your company’s network users trying to use it at once.
- Not enough VPN licenses: You may have purchased a license that allows, for example, 15 of your 30 employees to use your VPN at any given time. Normally, that’s plenty, but now all your employees need the VPN, so you have to upgrade the license.
Solution: Switch from a VPN to a “remote control” tool.
A VPN creates a secure connection between your office and wherever you work remotely. Your laptop, tablet, or phone use the software that’s installed on your work computer, and all the data this software processes must go through your home internet connection.
Rather than processing all the data from your office servers via your home internet, a remote access service gives you remote control over your work computer’s keyboard and mouse. All the major processing is then done on your office’s network, using its internet connection speed.
If you use a managed IT services provider, that company may have its own remote control service their clients can use (ours is called TechGen Remote Access).
2. If I use Zoom, how do I Avoid Getting Zoom-Bombed? And Which Other Tools are Working Best for Web Conferencing?
Just about everyone I’ve discussed web conferencing tools with has asked me about “Zoom-bombing,” where trolls hack into Zoom meetings and display horrible images and messages.
I do have concerns about reports of security and privacy issues with Zoom. But many of these issues cropped up because the original default settings in the free version of Zoom didn’t include basic security measures, such as requiring passwords.
Zoom now has basic safety features turned on by default. That doesn’t make it completely safe, however, and it’s a good lesson about using these tools in general: Lack of passwords and other protections make the platform super easy to use — and really easy to hack.
Solution: Try some alternative services.
Use MS Teams for internal-only use and use Webex, GoToMeeting or other established services for external use.
- Microsoft Teams generally works well when the participants are all within your organization (or contractors who have email accounts using your company’s domain). It doesn’t always work as well when you need to invite people from outside your firm.
- Established services with paid options for small businesses: Cisco Webex, GoTo Meeting, Google Hangouts Meet, and other services that, before Zoom took off during the Coronavirus outbreak, were the workhorses for SMBs.
But, for these services to be safe, you still need to make sure security settings such as passwords and waiting rooms have been enabled.
3. What’s the Main Security Concern for People Working From Home?
It’s cyber thieves hacking into your home network and pivoting from that into your company’s network. A root cause of this: Remote workers who are more distracted than usual and fall for a phishing campaign.)
If employees are connecting to your company network for work every day, consider asking employees to allow your IT services firm to evaluate home internet setups for basic cybersecurity measures, such as a firewall and an antivirus suite.
This can be done remotely, without violating anyone’s privacy, and it shouldn’t take long.
Solution: Promote basic cybersecurity awareness and make sure VPNs are configured correctly.
This involves the following steps:
- Encourage strong passwords for your employees’ wifi routers. (Some people still have the factory default password). Provide tips for creating strong passwords, and perhaps a subscription to a password manager such as LastPass, so people only need to remember one good “master password.”
- Consider phishing awareness training for employees. Phishing attack emails related to COVID-19 increased 667% from March 1-23, according to researchers from the cybersecurity firm Barracuda. Try these free phishing awareness tests and tools from KnowBe4.
- Configure a VPN so it doesn’t allow your business computer to connect with other machines on your home network. You sacrifice some speed by using this setting (called “Tunnel All mode” rather than “Split Tunnel Mode”), but it’s more secure.
4. Are File-Sharing Services Like Dropbox a Safe Way to Collaborate With Other Employees and With Clients?
Any file-sharing service can be a major risk if you’re not using correct security settings.
If you and your employees are using personal computers for work at home, and you’re downloading files from company file-sharing services — like Microsoft SharePoint, Dropbox, Box.com, etc. — these files should never contain sensitive personal data of your company, clients, or vendors.
Another risk with file-sharing services inviting your personal email address to have access to a company folder.
Personal email simply isn’t secure. It’s also not safe to use personal email to send company files containing sensitive data to yourself, to your co-workers, or outside the firm.
Solution: Use data loss prevention settings on your file-sharing solutions.
- Configure Office 365 to require encryption on any device you use to sign on to Office 365. For example, one setting requires that a mobile device management tool be installed on the device you use to sign on. And in turn, that tool can be configured to require data encryption.
- Enable a block on users’ ability to share files outside of your organization. If that’s not practical, be sure your employees understand the risks of using personal computers and/or personal email to store or send sensitive company data.
5. Why Can’t I Print From the Printer I Have at Home?
Most work computers prevent employees who aren’t network administrators from installing things like printer drivers.
Solutions: Direct hookup or ask for admin help.
Try simply directly connecting your computer to your home printer with a USB cable. That usually works, but if it doesn’t, ask your network admin or IT services provider to change the setting remotely so you can install the driver for your home printer.
6. Are There Effective Tech Tools for Tracking My Employees’ Productivity When They’re Working From Home?
Yes, but for the tool to do its job, you need to agree with employees up front on reasonable expectations.
You want to simply trust employees to do their jobs — no matter where and when they work.
But as an employer it’s your responsibility to assess their productivity, and you have a right to know how your company’s IT equipment and network are being used.
Solution: Take a combined personal + tech approach.
First, speak candidly with employees about work-at-home performance expectations.Explain how the productivity tool will help them and your customers.
Be clear that you, as the employer, have the right to monitor how and when work computers are used.
How to Gain at Least One Positive Outcome From This Terrible Situation
We may never have a better opportunity than this to create or refine a solid business interruption (or “continuation” plan).
Ask for your employees’ feedback on your remote working operation. What worked? What didn’t? Document the results, and make sure everyone knows how to find your new/updated plan, should it be necessary, and how to follow it.
This may be a once-in-a-life occurrence. I hope so. But let’s stay ready, just in case.