Business on Top, PJs on the Bottom: Optimize Your Remote Office To Keep Working For You

woman working at home in business jacket and pajama pants “Are you working from home?”

It’s become a common question this past year as the COVID-19 pandemic upended our lives. When it was suddenly unsafe to work in the offices we’d spent years commuting to every day, we adapted fast: spare rooms were transformed into makeshift offices, old chairs were drafted into service as desk chairs, and our home wireless routers were pushed to their limits handling the new wave of traffic from video calls, file transfers, and Slack conversations.

We figured out how to use Zoom and GoToMeeting. More importantly, we discovered very fast that, angled correctly, our computer cameras would only capture the top half of our bodies, so we could throw on a respectable shirt and still maintain weekend-level comfort in pajama pants and slippers.

Yes, with the easier dress code, homemade coffee, and no time spent commuting, working from home definitely had its perks, even if what led us to that situation was tragic. But now, there are some encouraging signs that things may be improving, even if we’re not out of the woods totally yet.

Moreover, even as things return to something like “normal,” going to the office every may be a thing of the past. As more companies permanently move to offer remote work models, it seems increasingly likely that successful businesses looking to attract the best talent will need to take a hybridized approach, where employees can fluidly move from working at home to working at the office and back again.

The key to a set-up, like that, though, is ensuring that your business is optimized for remote work. If it is, you and/or your employees will be able to seamlessly transition back and forth between the home office and the traditional office as changing times and situations demand. If you’re not optimized, you may run into serious hurdles that impact your work.

Take a moment and ask yourself a few questions about your home office set-up, and determine if it’s working for you as well as it should.

coffee and computer at workstationAre you optimized for efficiency?

Because the pandemic hit so quickly, many were forced to scramble to set-up remote work solutions. Things simply needed to get done. But when it comes to ensuring that you can connect with your company servers and databases and collaborate effectively while remote, the quick solution may not be the best one.

Indeed, there’s no one-size-fits-all approach to remote work. Every business has different needs, and finding a remote work solution that best meets those needs is crucial. For many companies, a virtual private network (VPN) will offer the speed and reliability they need. Other companies may find that they also need a remote desktop set-up, so they can access programs they don’t have on their laptops.

Either way, choosing the option that works best for your company will allow your business to run smoothly no matter where you and your team are working from.

Is your network secure?

It’s unavoidable. Working with remote networks opens you and your business up to a variety of cyber-security risks. From viruses and hacks accessing open networks to data and records being stolen from Zoom, the systems and processes that allow for working outside the office allow numerous opportunities for hackers and others to compromise your security.

Does this mean that remote work should be avoided? Not at all. But a bit more diligence is required to stay safe. There a few simple solutions that can make a major difference.

For example, it’s invaluable to train and regularly update your team on best practices for spotting phishing scams and other potential attacks. It’s also important to password protect all valuable data and servers, with multifactor authentication.

One of the most important things you can do is set up a secure shared drive on the Cloud. Not only will this allow multiple people to work on the same file at the same time, it also offers protection through encryption.

man working at computer, smiling

Do you have the tech support you need?

As a beloved band of paranormal exterminators once asked, “who you gonna call?”

In a typical office, when something goes wrong, like a network outage, you know to contact your office IT pro for assistance. But working from home, an outage can make you feel completely cut off. It’s essential to have processes in place to address issues as they arise.

Even better, though, is having a dedicated IT team who monitors your network and can solve problems before they arise and cut you off. Even beyond maintenance like that, a dedicated and professional IT team can troubleshoot bigger picture issue’s with your company’s remote working set-up, and propose solutions and fixes that will prevent any issues from occurring.

We can help you find a remote office solution that really works.

Determining what home office setups work best for you and your team—now and in the long term—can be a daunting task, as can enabling all the protocols and protections you’ll need for cybersecurity. There are so many elements to consider, and there may even be technology and hardware issues you aren’t aware of.

Fortunately, you don’t have to figure it all out yourself. Your Beacon IT Services (BITS) team is ready to work with you to create a remote working solution that will deliver for your business and monitor your network. From selecting the best solutions to getting your network set up to being on-hand to make any changes that you need or address any issues that may arise, BITS will have your back every step of the way as you navigate the best ways to work in this changed (and changing) world. We’re just a click away.

So don’t trade in the sweatpants and slippers for slacks and loafers just yet. (Or ever). Contact us today and we’ll make your home office work as well for you as the real one, for as long as you need it to.

By | 2021-03-24T07:28:46+00:00 March 24th, 2021|System Administration, Cyber Security, IT Services|

Lessons in Cyber Security & Threat Prevention

Atlanta Ransomware Attack

The ransomware attack that took hostage a number of vital computer systems in Atlanta last month wreaked havoc on residents and sent the city’s administration scrambling. What can we learn from the situation?

Considering that city officials were aware as early as last summer that “severe and critical vulnerabilities” existed within the municipality’s computer network, the biggest takeaway is: DON’T WAIT to shore up your cyber security.

We’re not in the business of beating dead horses. And, surely, Atlanta officials have their hands full orchestrating the recovery from the attack and trying to return vital operations back to normal. Nonetheless, the fact that a 2017 internal city audit revealed an utter lack of preparedness to manage any sort of cyber threat should not go unmentioned.

What that means is the March 22 attack wasn’t a technology problem. As with most hacking efforts, it’s not the code that sinks you – it’s the human element that’s exploited for criminal gain. In this case, the human element was the inability of city administrators to respond to known threats. Not only was the city not equipped to handle an attack on its networks, it also didn’t have a proper response plan ready.

The number of ransomware attacks spiked sharply in the last year. So, if you don’t have an updated plan for your organization’s network security, you may very well be the next target of SamSam – the group responsible for the Atlanta situation – or another criminal outfit.

The good news is that there’s an army of cyber security professionals who are very skilled at crafting customized solutions. We, at Beacon, have been good at it for quite a while.

Protection Through Prevention

The best way to avoid a ransomware attack is to make sure that your network has a sufficiently strong firewall in place. A firewall identifies incoming web traffic and filters any suspicious or unapproved activity. The effectiveness of any firewall depends on how well it is configured. Typically, large networks require complex firewall configurations and a team of IT specialists for maintenance and monitoring.

Firewalls are great at protecting against known threats. However, new hacking techniques are developed every day. To defend against these zero-day exploits and other sophisticated attacks, IT pros deploy advanced automated audits that boot the threat off the targeted network. About 80% of current Beacon clients rely on this type of advanced protection. And, ideally, that number would be 100%.

Of course, even the most well-designed security setups can be breached. Criminal hackers know that people are the weakest link in network security and design attacks to take advantage of unwitting networks users. (There’s that human element again.) However, the odds of such attacks succeeding are low if your organization takes security awareness training seriously. Security seminars should be made available to every person on staff, and be repeated at least once every three years.

Recovery: It’s Good to Have a Back-Up Plan

Let’s be honest – sometimes hackers succeed even when you’ve done everything right. If that happens, you don’t want to find yourself in the same position as the folks in Atlanta. Backing up your network will protect you in case of a catastrophe.

While the concept is simple, data backup is actually a fairly complex process that takes considerable forethought. You’ll need to decide how often your network needs to be backed up (hourly, daily, weekly, etc). You’ll also have to examine how long your organization can go without access to your data.

A busy medical center, for example, would need to have its data backed up hourly to capture changing patient statuses, doctor’s orders, prescriptions, etc. With lives at stake, it would also be imperative to restore access to that data as quickly as possible.

Organizations that don’t deal with life and death issues would probably have less stringent requirements for their data protection plan.

We’re Here to Help

Have questions about your company’s cyber security? Give BITS a call at 336.546.6660, and we’ll be happy to talk to you about your concerns and data protection needs.

By | 2018-04-12T11:22:11+00:00 April 12th, 2018|IT Services|

It’s Finally Here! See the Birth…

After 8.5 hours of hard labor at M3 on St. Patrick’s Day, our newborn officially arrived at 3:20pm, weighing in at a hefty 4,621 pounds. Under trusted and constant care, Team M3 delivered a bright, healthy and colorful addition to the Beacon family.  We are so thankful for all the attention we are receiving for our carefully wrapped bundle of joy, which we’ve named “The BITS-Mobile”.

Beacon’s IT Services Division (“BITS”), which primarily serves the Triad area (Greensboro/Winston-Salem/High Point) has experienced fast growth over the last year. “The BITS-Mobile will not only provide transportation for our technical staff, but also transport equipment such as servers and desktops to our client sites when necessary,” says Mark Dirks, Beacon’s CEO.  “Since our BITS clients are mostly Triad-based, our marketing team recommended a more traditional ‘mobile’ marketing approach through vehicle graphics for local brand visibility.

Matthews Mobile Media (“M3”) has an incredible team and worked with our design team to produce a really creative and professional design. John Scaramuzzo, Beacon’s co-founder and COO, leads the newly dubbed “BITS” Division and is anticipating continued growth after seeing the client base double over the last 12 months.  “Although my team constantly monitors our clients’ technical infrastructure to maintain system health and deter technical problems, there are times when the staff needs to be on site for installations and to work on specific issues,” says Scaramuzzo.  “BITS is essentially an extension of our client’s organization and it’s important that we can be on-site within minutes.  So the BITS-Mobile is a welcome addition to the Team!”


Special Note from Matthews Mobile Media (M3): “Congratulations!  It’s a BITS mobile!!! We have been clients of Beacon for several years and have benefited from their expert team’s proactive service.  There is no doubt that the personal attention and dedication to client growth is a reflection of their mission.  What a privilege to be a part of the birth of their next generation by helping bring the BITS-Mobile to life.  To us, it is a natural fit because we specialize in mobile.  We help companies from all over express themselves through vehicle and environmental graphics.

We like to turn heads for our clients; that’s what we do! So helping to design, create, produce and apply that ‘outerwear’ for our Beacon’s newborn gives us an exceptional rush!  Who knew IT could be so sexy?  Well… we did ;)

Thank you, Beacon, for letting us outfit your newest addition!  All of us at Team M3 look forward to watching the BITS-Mobile grow up and have a little brother or sister very soon!

By | 2017-04-11T13:17:25+00:00 March 27th, 2017|BITS News|