SlideShare a Scribd company logo
Welcome to the
Work From Home
Game Plan Webinar
Presented By:
Work From Home Game Plan
•Facts from Working Remotely
•The Challenges of COVID-19
•The Basics for the Employer
•Best Practices for Employee
•Tools needed to Work Remotely
•Threat Landscape
•Cybersecurity Tips
•Questions
The Facts of Working Remotely
•52% of the global workforce works from home at least once per week
•85% of Millennials prefer to work remotely
•24% are willing to work longer hours to accomplish goals
•30% accomplish more in less time
•4X as many devices per employee
•Technology can enable teamwork
•People need to connect and communicate across organizations, locations and time zones.
•People have different expectations, preferences, skillsets and abilities
•Employees are now part of 2X as many teams and spend 50% more time collaborating.
•Companies save on rent when having employees work from home.
The Challenges of COVID-19
•Last minute CEO, Executive and Managerial Decisions
•No proper planning and budget
•Remote Employees is not normal. Example: Children will be home.
•Legacy Technology can make things complex
•Allowing BYOD into the Corporate Environment
•No Time for Training
•If Mandatory Quarantine is in place; fixing broken equipment will be an issue.
•Cybersecurity
The Basics for the Employer
•Implement remote work policies
•Have Employees take the equipment with them in case there is an overnight need.
•Analyze your IT Infrastructure
•Implement Cyber Security tools to protect the data.
•Implement a Disaster Recovery and Business Continuity Plan
•Protect against data leaks
•Understand Overtime Rules
•Employee Education is required
•Maintain patches on machines and devices
Best Practices for Employee
•Treat it like another day at the office. Get dressed just like you go to work.
•Set a part of your house as your dedicated work area. Keep in mind you will be doing video.
•Pay attention to Ergonomics.
•Investing in multiple monitors makes a difference in productivity.
•Know how to communicate with each other as you won’t be running into each other in the halls.
•Set clear expectations
•Resolve issues with a quick call. Promptly return emails, calls and voice mails.
•Ask for Feedback
•Set boundaries with your family.
•Have a “Fun” or “Social” Channel
•Make sure your loved ones know they can’t use your work equipment
The Tools needed to Work Remotely
•Business Class Email - Calendars
•Office 365
•G Suite
•Online File Storage, Sharing and Co-Authoring
•Chat and Online Meetings – Video Conferencing and Messaging Software
•Secure Remote Access – VPN, Remote Access Software
•Enterprise Level Antivirus
•Phone
• Line of Business Applications
Threat Landscape
Cyberattacks target small
businesses
Devices are compromised by
ransomware every month
Small businesses close their doors
after a cyberattack
Average cyber attack remediation
cost for small businesses
43% 55K 60% $900K
System, noun.
A set of things working together as parts of
a mechanism or an interconnecting network
Cyber Security Tips
•Avoid duplication of data at all costs
•Confidential
•Integrity
•Available
•Backups are the most important aspect of protecting
•Work with an MSP or a professional that can help you select the right tools and migration.
•Take advantage of the emergency offers by companies
•Make it easy for users to get started with tools that have self activation portals
•Setup MFA when possible
•Ensure devices and systems are fully protected
Cyber Security Tips
•Encrypt the devices
•Create a secure connection back to office
•Scan and secure email
•Provide Wireless Access Points to protect data
•Enable Web Filtering
•Enable Cloud Storage
•Manage Devices and Peripherals
•Control Mobile Devices
•Simplify security issue reporting
•Beware Shadow IT
Cyber Security in a Nutshell
Chamber in the Community
•Visit the Boca Chamber’s website under
Resources for information regarding COVID-
19.
https://web.bocaratonchamber.com/the_chamber/coronavirus.aspx
The APP for the Community
•The Boca Chamber app connects you
directly to The Chamber world.
•Socialize on social media
•Read up on the latest Chamber news
•Utilize our directory to make connections.
•Resources to enhance your Chamber
experience.
Erick Solms
CEO of Simplitfy
esolms@simplitfy.com
561-425-6101
https://www.linkedin.com/in/esolms
http://www.simplitfy.com
Contact us for a complimentary assessment.
Mention you are a member of the Chamber.

More Related Content

What's hot

10 Quick Cybersecurity Wins for Small Business
10 Quick Cybersecurity Wins for Small Business10 Quick Cybersecurity Wins for Small Business
10 Quick Cybersecurity Wins for Small Business
SYMBIONT, INC.
 
Leone ct#4 presentation
Leone ct#4 presentationLeone ct#4 presentation
Leone ct#4 presentation
vincentleone
 
Harry Regan - It's Never So Bad That It Can't Get Worse
Harry Regan - It's Never So Bad That It Can't Get WorseHarry Regan - It's Never So Bad That It Can't Get Worse
Harry Regan - It's Never So Bad That It Can't Get Worse
centralohioissa
 
Avoid the IT War Room: Integrate Mainframe and IBM i into ServiceNow
Avoid the IT War Room: Integrate Mainframe and IBM i into ServiceNowAvoid the IT War Room: Integrate Mainframe and IBM i into ServiceNow
Avoid the IT War Room: Integrate Mainframe and IBM i into ServiceNow
Precisely
 
Cybertopic_2security
Cybertopic_2securityCybertopic_2security
Cybertopic_2security
Anne Starr
 
gkkwqdqqndqw2121234Security essentials domain 4
gkkwqdqqndqw2121234Security essentials   domain 4gkkwqdqqndqw2121234Security essentials   domain 4
gkkwqdqqndqw2121234Security essentials domain 4
Anne Starr
 
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
centralohioissa
 
Cyber Security in the time of COVID -19
Cyber Security in the time of COVID -19Cyber Security in the time of COVID -19
Cyber Security in the time of COVID -19
fingerprint.sh
 
12 Simple Cybersecurity Rules For Your Small Business
12 Simple Cybersecurity Rules For Your Small Business 12 Simple Cybersecurity Rules For Your Small Business
12 Simple Cybersecurity Rules For Your Small Business
NSUGSCIS
 
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...
Sreejesh Madonandy
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015
Claus Cramon Houmann
 
The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…
Christopher Kranich
 
PITA Technical and Business Session: Cybersecurity outside the office
PITA Technical and Business Session: Cybersecurity outside the officePITA Technical and Business Session: Cybersecurity outside the office
PITA Technical and Business Session: Cybersecurity outside the office
APNIC
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
Nicholas Davis
 
Using Technology to Expand your Business
Using Technology to Expand your BusinessUsing Technology to Expand your Business
Using Technology to Expand your Business
trevorjobling
 
NZISF Talk: Six essential security services
NZISF Talk: Six essential security servicesNZISF Talk: Six essential security services
NZISF Talk: Six essential security services
Hinne Hettema
 
Lync – 6 top tips to avoid disaster
Lync – 6 top tips to avoid disasterLync – 6 top tips to avoid disaster
Lync – 6 top tips to avoid disaster
Modrus
 
L05 slides
L05 slidesL05 slides
L05 slides
Ann Bentley
 
Cloud content security vs innovation 2012_0821
Cloud content security vs innovation 2012_0821Cloud content security vs innovation 2012_0821
Cloud content security vs innovation 2012_0821
Brian Gleeson
 
Automating Business Processes
Automating Business ProcessesAutomating Business Processes
Automating Business Processes
SwiftTech Solutions, Inc.
 

What's hot (20)

10 Quick Cybersecurity Wins for Small Business
10 Quick Cybersecurity Wins for Small Business10 Quick Cybersecurity Wins for Small Business
10 Quick Cybersecurity Wins for Small Business
 
Leone ct#4 presentation
Leone ct#4 presentationLeone ct#4 presentation
Leone ct#4 presentation
 
Harry Regan - It's Never So Bad That It Can't Get Worse
Harry Regan - It's Never So Bad That It Can't Get WorseHarry Regan - It's Never So Bad That It Can't Get Worse
Harry Regan - It's Never So Bad That It Can't Get Worse
 
Avoid the IT War Room: Integrate Mainframe and IBM i into ServiceNow
Avoid the IT War Room: Integrate Mainframe and IBM i into ServiceNowAvoid the IT War Room: Integrate Mainframe and IBM i into ServiceNow
Avoid the IT War Room: Integrate Mainframe and IBM i into ServiceNow
 
Cybertopic_2security
Cybertopic_2securityCybertopic_2security
Cybertopic_2security
 
gkkwqdqqndqw2121234Security essentials domain 4
gkkwqdqqndqw2121234Security essentials   domain 4gkkwqdqqndqw2121234Security essentials   domain 4
gkkwqdqqndqw2121234Security essentials domain 4
 
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
 
Cyber Security in the time of COVID -19
Cyber Security in the time of COVID -19Cyber Security in the time of COVID -19
Cyber Security in the time of COVID -19
 
12 Simple Cybersecurity Rules For Your Small Business
12 Simple Cybersecurity Rules For Your Small Business 12 Simple Cybersecurity Rules For Your Small Business
12 Simple Cybersecurity Rules For Your Small Business
 
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015
 
The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…
 
PITA Technical and Business Session: Cybersecurity outside the office
PITA Technical and Business Session: Cybersecurity outside the officePITA Technical and Business Session: Cybersecurity outside the office
PITA Technical and Business Session: Cybersecurity outside the office
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
 
Using Technology to Expand your Business
Using Technology to Expand your BusinessUsing Technology to Expand your Business
Using Technology to Expand your Business
 
NZISF Talk: Six essential security services
NZISF Talk: Six essential security servicesNZISF Talk: Six essential security services
NZISF Talk: Six essential security services
 
Lync – 6 top tips to avoid disaster
Lync – 6 top tips to avoid disasterLync – 6 top tips to avoid disaster
Lync – 6 top tips to avoid disaster
 
L05 slides
L05 slidesL05 slides
L05 slides
 
Cloud content security vs innovation 2012_0821
Cloud content security vs innovation 2012_0821Cloud content security vs innovation 2012_0821
Cloud content security vs innovation 2012_0821
 
Automating Business Processes
Automating Business ProcessesAutomating Business Processes
Automating Business Processes
 

Similar to Boca Chamber and Simplitfy - Work From Home Game Plan

Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
woodsy01
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
Kazi Sarwar Hossain
 
Webinar: Microsoft Azure-2016-10-19
Webinar: Microsoft Azure-2016-10-19Webinar: Microsoft Azure-2016-10-19
Webinar: Microsoft Azure-2016-10-19
TechSoup
 
Implementing Technology in Your Agency - Laird Rixford, ITC
Implementing Technology in Your Agency - Laird Rixford, ITCImplementing Technology in Your Agency - Laird Rixford, ITC
Implementing Technology in Your Agency - Laird Rixford, ITC
Insurance Technologies Corporation (ITC)
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
Community IT Innovators
 
GadellNet Accelerate Tech 2016 presentation
GadellNet Accelerate Tech 2016 presentationGadellNet Accelerate Tech 2016 presentation
GadellNet Accelerate Tech 2016 presentation
Economic Alliance of Kankakee County
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
Sonny Hashmi
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
Sonny Hashmi
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
Net at Work
 
Dna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing PresentationDna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing Presentation
SylCotter
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
C/D/H Technology Consultants
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
TechSoup
 
Law Practice Management - Organization, Cloud, Social Media and Ethics
Law Practice Management - Organization, Cloud, Social Media and EthicsLaw Practice Management - Organization, Cloud, Social Media and Ethics
Law Practice Management - Organization, Cloud, Social Media and Ethics
Jennifer Ellis, JD, LLC
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
AugmentedWorldExpo
 
Technology Trends for 2019: What it Means for Your Business
Technology Trends for 2019: What it Means for Your BusinessTechnology Trends for 2019: What it Means for Your Business
Technology Trends for 2019: What it Means for Your Business
Precisely
 
Management Information Systems Course Project
Management Information Systems Course ProjectManagement Information Systems Course Project
Management Information Systems Course Project
Dallas Andrakulic
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
Jay McLaughlin
 
SME Masterclass: 5 Steps to Making Remote Working a Reality in Your Business
SME Masterclass: 5 Steps to Making Remote Working a Reality in Your BusinessSME Masterclass: 5 Steps to Making Remote Working a Reality in Your Business
SME Masterclass: 5 Steps to Making Remote Working a Reality in Your Business
Daisy Group
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
Falgun Rathod
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
Misha Hanin
 

Similar to Boca Chamber and Simplitfy - Work From Home Game Plan (20)

Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Webinar: Microsoft Azure-2016-10-19
Webinar: Microsoft Azure-2016-10-19Webinar: Microsoft Azure-2016-10-19
Webinar: Microsoft Azure-2016-10-19
 
Implementing Technology in Your Agency - Laird Rixford, ITC
Implementing Technology in Your Agency - Laird Rixford, ITCImplementing Technology in Your Agency - Laird Rixford, ITC
Implementing Technology in Your Agency - Laird Rixford, ITC
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
 
GadellNet Accelerate Tech 2016 presentation
GadellNet Accelerate Tech 2016 presentationGadellNet Accelerate Tech 2016 presentation
GadellNet Accelerate Tech 2016 presentation
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
 
Dna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing PresentationDna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing Presentation
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
 
Law Practice Management - Organization, Cloud, Social Media and Ethics
Law Practice Management - Organization, Cloud, Social Media and EthicsLaw Practice Management - Organization, Cloud, Social Media and Ethics
Law Practice Management - Organization, Cloud, Social Media and Ethics
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
Technology Trends for 2019: What it Means for Your Business
Technology Trends for 2019: What it Means for Your BusinessTechnology Trends for 2019: What it Means for Your Business
Technology Trends for 2019: What it Means for Your Business
 
Management Information Systems Course Project
Management Information Systems Course ProjectManagement Information Systems Course Project
Management Information Systems Course Project
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
SME Masterclass: 5 Steps to Making Remote Working a Reality in Your Business
SME Masterclass: 5 Steps to Making Remote Working a Reality in Your BusinessSME Masterclass: 5 Steps to Making Remote Working a Reality in Your Business
SME Masterclass: 5 Steps to Making Remote Working a Reality in Your Business
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 

Recently uploaded

VYAPAR TRENDS JUNE-2024 e-EDITION (VOL-2, ISSUE-05)
VYAPAR TRENDS JUNE-2024 e-EDITION (VOL-2, ISSUE-05)VYAPAR TRENDS JUNE-2024 e-EDITION (VOL-2, ISSUE-05)
VYAPAR TRENDS JUNE-2024 e-EDITION (VOL-2, ISSUE-05)
ftiiassociation
 
1比1定做(aub毕业证书)伯恩茅斯艺术大学毕业证硕士学历证书原版一模一样
1比1定做(aub毕业证书)伯恩茅斯艺术大学毕业证硕士学历证书原版一模一样1比1定做(aub毕业证书)伯恩茅斯艺术大学毕业证硕士学历证书原版一模一样
1比1定做(aub毕业证书)伯恩茅斯艺术大学毕业证硕士学历证书原版一模一样
es4hjcss
 
一比一原版(UAL毕业证)伦敦艺术大学毕业证如何办理
一比一原版(UAL毕业证)伦敦艺术大学毕业证如何办理一比一原版(UAL毕业证)伦敦艺术大学毕业证如何办理
一比一原版(UAL毕业证)伦敦艺术大学毕业证如何办理
ocqunu
 
1:1制作英国伦敦大学毕业证(london毕业证书)学历学位证书原版一模一样
1:1制作英国伦敦大学毕业证(london毕业证书)学历学位证书原版一模一样1:1制作英国伦敦大学毕业证(london毕业证书)学历学位证书原版一模一样
1:1制作英国伦敦大学毕业证(london毕业证书)学历学位证书原版一模一样
es4hjcss
 
Complete Self-write Restaurant Business Plan Guide for Entrepreneurs
Complete Self-write Restaurant Business Plan Guide for EntrepreneursComplete Self-write Restaurant Business Plan Guide for Entrepreneurs
Complete Self-write Restaurant Business Plan Guide for Entrepreneurs
Kopa Global Technologies
 
Exploring the Contrast Silicone Sponge Rubber Versus Foam Rubber.pptx
Exploring the Contrast Silicone Sponge Rubber Versus Foam Rubber.pptxExploring the Contrast Silicone Sponge Rubber Versus Foam Rubber.pptx
Exploring the Contrast Silicone Sponge Rubber Versus Foam Rubber.pptx
Elastostar Rubber Corporation
 

Recently uploaded (6)

VYAPAR TRENDS JUNE-2024 e-EDITION (VOL-2, ISSUE-05)
VYAPAR TRENDS JUNE-2024 e-EDITION (VOL-2, ISSUE-05)VYAPAR TRENDS JUNE-2024 e-EDITION (VOL-2, ISSUE-05)
VYAPAR TRENDS JUNE-2024 e-EDITION (VOL-2, ISSUE-05)
 
1比1定做(aub毕业证书)伯恩茅斯艺术大学毕业证硕士学历证书原版一模一样
1比1定做(aub毕业证书)伯恩茅斯艺术大学毕业证硕士学历证书原版一模一样1比1定做(aub毕业证书)伯恩茅斯艺术大学毕业证硕士学历证书原版一模一样
1比1定做(aub毕业证书)伯恩茅斯艺术大学毕业证硕士学历证书原版一模一样
 
一比一原版(UAL毕业证)伦敦艺术大学毕业证如何办理
一比一原版(UAL毕业证)伦敦艺术大学毕业证如何办理一比一原版(UAL毕业证)伦敦艺术大学毕业证如何办理
一比一原版(UAL毕业证)伦敦艺术大学毕业证如何办理
 
1:1制作英国伦敦大学毕业证(london毕业证书)学历学位证书原版一模一样
1:1制作英国伦敦大学毕业证(london毕业证书)学历学位证书原版一模一样1:1制作英国伦敦大学毕业证(london毕业证书)学历学位证书原版一模一样
1:1制作英国伦敦大学毕业证(london毕业证书)学历学位证书原版一模一样
 
Complete Self-write Restaurant Business Plan Guide for Entrepreneurs
Complete Self-write Restaurant Business Plan Guide for EntrepreneursComplete Self-write Restaurant Business Plan Guide for Entrepreneurs
Complete Self-write Restaurant Business Plan Guide for Entrepreneurs
 
Exploring the Contrast Silicone Sponge Rubber Versus Foam Rubber.pptx
Exploring the Contrast Silicone Sponge Rubber Versus Foam Rubber.pptxExploring the Contrast Silicone Sponge Rubber Versus Foam Rubber.pptx
Exploring the Contrast Silicone Sponge Rubber Versus Foam Rubber.pptx
 

Boca Chamber and Simplitfy - Work From Home Game Plan

  • 1. Welcome to the Work From Home Game Plan Webinar Presented By:
  • 2. Work From Home Game Plan •Facts from Working Remotely •The Challenges of COVID-19 •The Basics for the Employer •Best Practices for Employee •Tools needed to Work Remotely •Threat Landscape •Cybersecurity Tips •Questions
  • 3. The Facts of Working Remotely •52% of the global workforce works from home at least once per week •85% of Millennials prefer to work remotely •24% are willing to work longer hours to accomplish goals •30% accomplish more in less time •4X as many devices per employee •Technology can enable teamwork •People need to connect and communicate across organizations, locations and time zones. •People have different expectations, preferences, skillsets and abilities •Employees are now part of 2X as many teams and spend 50% more time collaborating. •Companies save on rent when having employees work from home.
  • 4. The Challenges of COVID-19 •Last minute CEO, Executive and Managerial Decisions •No proper planning and budget •Remote Employees is not normal. Example: Children will be home. •Legacy Technology can make things complex •Allowing BYOD into the Corporate Environment •No Time for Training •If Mandatory Quarantine is in place; fixing broken equipment will be an issue. •Cybersecurity
  • 5. The Basics for the Employer •Implement remote work policies •Have Employees take the equipment with them in case there is an overnight need. •Analyze your IT Infrastructure •Implement Cyber Security tools to protect the data. •Implement a Disaster Recovery and Business Continuity Plan •Protect against data leaks •Understand Overtime Rules •Employee Education is required •Maintain patches on machines and devices
  • 6. Best Practices for Employee •Treat it like another day at the office. Get dressed just like you go to work. •Set a part of your house as your dedicated work area. Keep in mind you will be doing video. •Pay attention to Ergonomics. •Investing in multiple monitors makes a difference in productivity. •Know how to communicate with each other as you won’t be running into each other in the halls. •Set clear expectations •Resolve issues with a quick call. Promptly return emails, calls and voice mails. •Ask for Feedback •Set boundaries with your family. •Have a “Fun” or “Social” Channel •Make sure your loved ones know they can’t use your work equipment
  • 7. The Tools needed to Work Remotely •Business Class Email - Calendars •Office 365 •G Suite •Online File Storage, Sharing and Co-Authoring •Chat and Online Meetings – Video Conferencing and Messaging Software •Secure Remote Access – VPN, Remote Access Software •Enterprise Level Antivirus •Phone • Line of Business Applications
  • 8. Threat Landscape Cyberattacks target small businesses Devices are compromised by ransomware every month Small businesses close their doors after a cyberattack Average cyber attack remediation cost for small businesses 43% 55K 60% $900K
  • 9. System, noun. A set of things working together as parts of a mechanism or an interconnecting network
  • 10. Cyber Security Tips •Avoid duplication of data at all costs •Confidential •Integrity •Available •Backups are the most important aspect of protecting •Work with an MSP or a professional that can help you select the right tools and migration. •Take advantage of the emergency offers by companies •Make it easy for users to get started with tools that have self activation portals •Setup MFA when possible •Ensure devices and systems are fully protected
  • 11. Cyber Security Tips •Encrypt the devices •Create a secure connection back to office •Scan and secure email •Provide Wireless Access Points to protect data •Enable Web Filtering •Enable Cloud Storage •Manage Devices and Peripherals •Control Mobile Devices •Simplify security issue reporting •Beware Shadow IT
  • 12. Cyber Security in a Nutshell
  • 13.
  • 14. Chamber in the Community •Visit the Boca Chamber’s website under Resources for information regarding COVID- 19. https://web.bocaratonchamber.com/the_chamber/coronavirus.aspx
  • 15. The APP for the Community •The Boca Chamber app connects you directly to The Chamber world. •Socialize on social media •Read up on the latest Chamber news •Utilize our directory to make connections. •Resources to enhance your Chamber experience.
  • 16. Erick Solms CEO of Simplitfy esolms@simplitfy.com 561-425-6101 https://www.linkedin.com/in/esolms http://www.simplitfy.com Contact us for a complimentary assessment. Mention you are a member of the Chamber.

Editor's Notes

  1. Change background Video Voice 3 Questions Send me a chat right away Mute my computer and phone Cough I hope everyone is safe Thanks the first responder and all the medical teams Thank you Chamber Questions through the Chat as everyone is muted
  2. Our IT infrastructure is also a system. A complex, inter-connected network of PCs, Macs, servers, printers, mobile devices, apps, cloud workloads, switches, printers, firewalls, wireless systems … and all the software that runs on them. Your IT infrastructure works as a system. It makes sense that cybersecurity should also work as a system. A system to secure a system.
  3. Synchronized Security is the Sophos cybersecurity system. It will transform the way you protect your business, forever. Let’s start by explaining what it is, and then how it helps.