We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,259 News Articles

How Do You Support Telecommuters?

Take our poll and let us know how you handle this complex issue.

One crucial step in implementing teleworking is to ensure that groups of remote users engaging in the same project can easily work together. Adopting a collaboration method that requires 48 hours' notice to create a teleconference or that demands administrator intervention to create a new document tree will stifle productivity and, in all likelihood, cause users to circumvent the system.

Avoiding this undesirable outcome is not really a function of choosing the right software, since most collaboration products--Google Docs, HyperOffice, MindJet, and SharePoint, to name a few--let users easily set up conferences, shared folders, and so forth. It's more a function of how you set up and document your company's procedures, which users you grant administrative rights to, and how much control your IT department exerts over the process.

If the process is too rigid, the ready availability of free, cloud-based alternatives will encourage users to make an end run around the obstruction, which can lead to a much greater loss of control than would have resulted from allowing users to make their own changes in the original software.

Even if you give users some freedom to create their own groups, start new document trees, or initiate teleconferences, you will still need to enforce security policies. To serve a widely dispersed workforce, communications must pass through the Internet and documents must reside in the cloud or on remote PCs, which makes properly setting up and following security protocols essential. Key considerations include ensuring that traffic between users is properly encrypted, making passwords long enough that hackers can't easily guess them, and maintaining data stored on systems outside the company in encrypted form when it isn't in use.

Logistically, confirming that the collaboration process is secure and efficient is more a matter of ensuring that the software you'll be using is set up correctly than of adding supplemental hardware or software. Most collaboration tools offer encryption of any data being moved through SSL, access control to enforce strong passwords for users, and encryption of data stores. But everything has to be set up correctly, and you need to ensure that employees use the tools properly. They should not share passwords, for example, and they should clear data from public PCs after participating in group work.

Please tell us below how your company manages its mix of tools for telecommuters.

IDG UK Sites

How to get a free EE Power Bar: Mobile and broadband customers eligible for free smartphone charger

IDG UK Sites

Why Netflix won't terminate your account for using a VPN, probably

IDG UK Sites

Forever 21 denies pirating Adobe, Autodesk and Corel software, accuses companies of 'bullying'

IDG UK Sites

New Apple TV 2015 release date rumours: Apple's WWDC invite shows Apple TV