<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cloud9advisers.com/News/tag/wfh/feed" rel="self" type="application/rss+xml"/><title>Cloud 9 Advisers - News #WFH</title><description>Cloud 9 Advisers - News #WFH</description><link>https://www.cloud9advisers.com/News/tag/wfh</link><lastBuildDate>Fri, 27 Feb 2026 19:31:35 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[New WFH Workforce protections]]></title><link>https://www.cloud9advisers.com/News/post/new-wfh-workforce-protections</link><description><![CDATA[There may be some light at the end of this pandemic tunnel… Remote work has evolved into a permanent fixture and must be included in long-term planning. This introduces more risks around access as employees connect in new ways.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_gOkdvbyBQHmEWjHApA_8Yg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_yKOJH6bdT4Kih8kIJe9BNg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_cu0WdtFoSMmdkIG_5G0nZg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_76bglzXFREWUAAmjFAUoPw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_76bglzXFREWUAAmjFAUoPw"].zpelem-heading { border-radius:1px; margin-inline-end:100px; margin-inline-start:100px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Tech and </span>Techniques<span style="color:inherit;">&nbsp;to Protect the New WFH Workforce</span></h1></div>
<div data-element-id="elm_gcpkrgEkLQamaqvEWaQIKQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_gcpkrgEkLQamaqvEWaQIKQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;font-size:18px;">Even if the pandemic ends tomorrow, everything has changed. It’s time to revisit, rethink, and revise. A look at a few technologies to better secure systems, data, and a permanent home-based/hybrid workforce.</span><br></p></div>
</div><div data-element-id="elm__Pb-ylLvJSD-xb-PJzIf3w" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm__Pb-ylLvJSD-xb-PJzIf3w"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/WFCS-1.jpeg" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_qR7Kf7k6Tu2pp0eKBQIphg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_qR7Kf7k6Tu2pp0eKBQIphg"].zpelem-text { border-radius:1px; margin-block-start:22px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;font-size:18px;">Remote work has evolved into a permanent fixture and must be included in long-term planning. This introduces more risks around access as employees connect in new ways.</span><br></p></div>
</div><div data-element-id="elm_iwvkwHvYmsrlUt5gSyTMEg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_iwvkwHvYmsrlUt5gSyTMEg"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_iwvkwHvYmsrlUt5gSyTMEg"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_umLn4meYqa32K95-tLgY6g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_umLn4meYqa32K95-tLgY6g"].zprow{ border-radius:1px; } </style><div data-element-id="elm_xzz7Ap_QxTWfrfeJ-b-mkg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_xzz7Ap_QxTWfrfeJ-b-mkg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_lXzHN7r4Qcla3nvsYpHnmA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_lXzHN7r4Qcla3nvsYpHnmA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:15px;">There may be some light at the end of this pandemic tunnel… oh wait, no. That’s just a guy on a bicycle with a flashlight coming this way to tell us it ain’t over yet. Nevermind.&nbsp; ...but it is clear that many companies will never go back to demanding employees come to the office once this thing is finally over. The thought of not coming back to the office at all has crossed the minds of some owners, founders, and executives, leaving the open question “do we still need to pay all that money for all that space?”</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">We can no longer assume the current environment is temporary and we must start planning and investing accordingly. The systems and tools that once supported the occasional road-warrior workforce and coincidentally served companies so well during the initial season of COVID now need to be revisited, rethought, and revised.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">The glorious benefits and ability to work from anywhere has been in the vernacular of tech company sales teams for ages now. I remember, just a few years ago, being required to chant “anytime, anywhere, any device” in every sales meeting I had back when I was pedaling phone systems. Even if it was just for a 50 site gas station franchise.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Once relegated to traveling executives and sales teams, now the anytime, anywhere, any device mantra is the prevailing, and often only, option for many people. But enterprise tech needs to go much further than a decent cloud phone system and a VPN connection if companies want to pivot and make real and lasting changes.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Digital transformation is the promise of fundamentally changing how businesses operate and deliver value to customers by integrating “digital” into all areas of the business. It is no longer a distant pipe dream to keep pushing to the back burner. It is real, it is important, and it is necessary for change. Of the many categories, parts, and tactics to an overall digital transformation strategy, a solid security foundation might be the most important and therefore the best place to start.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Those systems and tools that once served so well in the beginning of the pandemic now need closer inspection. Creating an extended and enhanced secure foundation is critical. One that is nimble and flexible, able to support the “new normal” hybrid/remote workforce, able to provide access to all the company’s workflows, and enhance collaboration for dispersed teams.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">The following sections are elements and excerpts from the article “6 top security technologies to protect remote workers” from our friends at <a href="https://www.csoonline.com">www.CSOonline.com</a> and written by Peter Wayner, Contributing Editor. We’ve embellished, elaborated, added, and removed some to fit here better. They illustrate a few basic security tools and technologies to support the new age of full-time and hybrid remote workers.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;font-weight:700;">Multi-factor authentication (MFA)</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">One of the first challenges will be identifying the users. The old-fashioned password may be sufficient within the confines of a trusted office but adding a layer of assurance is better. The simplest solution is to require a second level of authentication such as the employees’ mobile phones. Some service providers like 8x8, GoTo, Vonage, Ooma, and RingCentral offer a wide range of communications channels to users including business SMS text messaging.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">More sophisticated solutions use apps running locally on the mobile device that can generate single-use passwords based upon the time. Tools like Google Authenticator, DuoLingo, FreeOTP, and LinOTP store a shared secret when the user first initializes them and then uses this to generate a new password each time the user wants to log in.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">For the hyper-secure, there is increased interest in dedicated hardware tokens that apply all encryption and authentication algorithms inside a special piece of hardware. Tools like the RSA SecurID, Yubikey, or Onlykey aren’t susceptible to attacks that are able to infiltrate the desktop or mobile operating systems. They offer increased security but at the cost of requiring users to juggle one more device.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;font-weight:700;">Identity and access management</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">The tools for multi-factor authentication (MFA) need to work closely with enterprise applications, and this is a challenge for in-house developers who will need to adjust the local codebase. Some teams are turning to identity and access management (IAM) services. They are often referred to as Identity as a Service (IDaaS) or authentication as a service (but AaaS is not really a thing)&nbsp; IAM is&nbsp; designed to be easily integrated into any codebase. Software from companies like Auth0 or Okta handles identity and access management with the best algorithms, allowing the in-house developers to concentrate on the business logic.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Auth0, for instance, offers a collection of quick-start examples that let a developer cut and paste a few lines of code and secure everything inside the application. The code from Auth0 adds a login dialog box and then the Auth0 servers check the password and enforce any stronger rules like a requirement for two-factor authentication. If you need to trigger a mobile app or send an SMS, Auth0’s servers do the work. When it is satisfied, it passes control back to your application.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Okta offers a similar set of services and likes to call its approach an “identity engine” for testing anyone who wants access. It rolls together a collection of authentication and management tools into a flexible pipeline that simplifies creating accounts and granting the owners correct access. The steps can be configured to include a variety of options like tracking the user’s specific laptop or phone to reduce the focus on the password alone.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">The companies also simplify the work of juggling all the accounts by providing a dashboard for tracking users, adding new accounts and adjusting access roles. The developer can add a sophisticated layer that organizes both identity and authentication with the pre-tested code.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;font-weight:700;">Zero Trust Network Access (ZTNA)</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">If you use a virtual private network (VPN), you already know that you must be able to trust the endpoint. Keep in mind that just because the company bought the asset three years ago doesn’t necessarily mean that it is still a trusted endpoint.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">While still widely used, VPN itself leaves much to be desired and is beginning to show its age. Today, VPN is not the best model for a world where there are no clear lines that mark where the office begins and where it ends. Growing in popularity as an alternative, some organizations are adopting a zero-trust model, which assumes that all employees are logging in from a dangerous place like, say, a coffee shop whose WiFi is compromised by an evil hacker collective. ZTNA always assumes that all packets are flowing through enemy territory.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">This wary attitude is not just for bits and bytes traveling over the network. Many inward-facing applications are constructed with the assumption that they will live in a secure network because some firewall or other tool has filtered out dangerous packets. The old paradigm of a strong perimeter made it possible for application developers to ignore security concerns.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Moving to zero trust means shifting attitudes. Todd Thiemann, vice president of marketing at threat intelligence firm HYAS, says, “The perimeter is thoroughly dead. If you are relying on gateway security, you are not watching all the traffic flowing in and out of the work-from-home [and other remote] endpoints.”</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;font-weight:700;">Secure Access Service Edge (SASE)</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Another way to rework existing applications for staff on the open internet is to add a special gatekeeper where users and their requests for data will be stopped to check for correct identity and access. One growing architectural model for this kind of smart, pan-enterprise filter is a process that some vendors call “Secure Access Service Edge” or SASE (pronounced “sassy”). This gatekeeper is much smarter than a typical firewall and can deploy stateful filtering by examining the data inside the requests and make intelligent decisions based upon these values. SASE aims to remove the outdated idea of a site-centric network to a more user-centric approach.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">This new layer can be added to protect any of the various cloud and web services including many that might even be hosted outside the company. The user’s computer talks only to the SASE gatekeeper and the other services only answer to requests that have been checked by the SASE gatekeeper.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Solutions from companies like CATO Networks, Cloud Genix (Palo Alto), Open Systems, and others not only combine all the benefits of SDWAN and Next-Gen Firewall technologies but also track users over time and make decisions about access to all services even if they aren’t hosted in the same location or the same cloud.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;font-weight:700;">Software-Defined Perimeter (SDP)</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">If it isn’t evident by now, allow me to reiterate. Networks operate far differently than in the past and especially so these days. Considering the dramatic increase in and changing patterns of traffic; both internal and external, the traditional “fixed” perimeter is severely limited. The traditional perimeter usually and simply deemed the internal network as trustworthy and the external network as hostile. Visibility and accessibility were the basis of that traditional approach.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">SDP is an extension of an overall zero-trust methodology and effectively creates a new flexible network perimeter. Rather than a fixed, static perimeter, SDP functionality deploys multiple dynamic perimeters to account for cloud, multi-cloud, hybrid environments, and on-premise and heavily relies on two important things; authentication and authorization. SDP can also be especially useful for the required dynamic access of today’s (and tomorrow’s) mostly permanent remote workforce.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;font-weight:700;">Cloud applications and storage</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Employees’ remote computers can’t become regular storage locations for sensitive documents and data. Employees should not be able to work with sensitive information with unencrypted thumb drives or other hardware and leave the data in locations where thieves could prey upon them. Ransomware continues to be a serious threat for destroying remote data.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Many companies are shifting to web-based office tools like Google Workspace (formerly G Suite) or Microsoft Teams where cloud storage with encryption is available. These platforms are very flexible, perfect for dispersed teams, and relatively easy to deploy to a large workforce, but the security details are still not completely understood. While the major companies employ large security teams, the model of shipping code to people’s browsers is still evolving. Google, for example, suffered an embarrassing leak of private documents. And Microsoft has had its share of awkward moments and outages.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">On the other hand, from a security perspective, these two giants have cleared several strict Federal cloud security programs like FedRAMP and others. FedRAMPs mission is to “promote the adoption of secure cloud services across the Federal Government by providing a standardized approach to security and risk assessment.” Ultra-security conscience agencies and contractors often rely on FedRAMP approved vendors and service providers because of the strict minimum standards required.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;font-weight:700;">TLS certificates</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">When employees log in remotely, they should use encrypted connections. Make sure websites have updated TLS certificates and the sites use HTTPS for all communications. Installing certificates to enable encrypted web connections couldn’t be easier thanks to the efforts of projects like Let’s Encrypt. Certificates offering more elaborate guarantees like organization are found with other certificate authorities like DigiCert, GeoTrust and Comodo. Many cloud providers and colocation services will resell certificates.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;font-weight:700;">Review assumptions about remote security</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Some of the most important steps are not technical; they’re emotional and personal. “Everybody went home very rapidly and now I think we're in an era where we have to formalize procedures,” says Greg Conti, a co-founder of cybersecurity research firm Kopidlon. “We can’t assume it's temporary, then we need to develop policies for the long haul.&quot;&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">One important premise behind digital transformation is user and customer accessibility. The best foundation for digital transformation is “distributed” security. The best strategy for security is a layered approach. Combining a few, or in some cases all, of the technologies and techniques here may be the right approach for your organization. For example ZTNA and SDP work well together, when done right. In many instances, these technologies can completely replace existing legacy solutions and methodologies. Caution should be taken so that things don’t get unnecessarily complicated and undermine goals and objectives..&nbsp;</span></p><p style="margin-bottom:10pt;"></p><p style="margin-bottom:10pt;"></p><p style="margin-bottom:10pt;"></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><p style="margin-bottom:10pt;"></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span><span style="color:inherit;"></span></span></p><p style="margin-bottom:10pt;"></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><p style="margin-bottom:10pt;"></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Everyone should pause and revisit all decisions made in haste. The pandemic forced everyone to act quickly and in some cases rashly. It’s no longer a matter of holding on until this thing is over. Even if it’s all ends tomorrow it has changed everything and those changes aren’t going away.</span></p><p style="margin-bottom:10pt;"></p><p style="margin-bottom:10pt;"></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><p style="margin-bottom:10pt;"></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="font-size:15px;"><span style="color:inherit;"></span></span></p><p style="margin-bottom:10pt;"></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span><span style="color:inherit;"></span></span></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="font-size:15px;"><span style="color:inherit;"></span></span></p><p style="margin-bottom:10pt;"></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="font-size:15px;"><span style="color:inherit;"></span></span></p><div></div>
<p></p><p><span style="font-size:15px;"><span style="color:inherit;"></span></span></p></div>
</div></div><div data-element-id="elm_f7K7eJjHlgYw6e-1oTIOEg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_f7K7eJjHlgYw6e-1oTIOEg"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_g-T-HgQvSlz8clQaDUusZw" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_g-T-HgQvSlz8clQaDUusZw"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_HHGclGAVB56BMinShtsYYg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_HHGclGAVB56BMinShtsYYg"].zpelem-text { border-radius:1px; margin-inline-end:60px; margin-inline-start:60px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="color:inherit;"><div>Cloud 9 Advisers helps business leaders and understaffed IT teams that need a strategic partner, not just another vendor. We help you buy the right technology solutions and not “get sold” on the wrong ones. We work with you to rationalize and reduce technology spending without sacrificing technology by employing sound digital transformation principles and strategies.</div><div><br></div><div>We do not sell solutions, we help you buy solutions. We are not a vendor, we help you find the right vendors. We facilitate decisions by diagnosing the problems and pains you’re currently facing then prescribing the right procedures and “medication”.&nbsp;</div><div><br></div><div>We are impartial, unbiased, and vendor-neutral experts in Cybersecurity, Communications, Connectivity, and Cloud technologies and solutions. Our proprietary software contains decades of data and analytics on all of the 250+ vendors in our Supplier Portfolio. We will quickly discover, refine, then match your requirements with the vendors’ capabilities; eliminating months of research trying to do it on your own.&nbsp;</div><div><br></div><div>Contact us and book an appointment today to learn more</div></span></div>
</div></div><div data-element-id="elm_4_ArpSxEQo29V4AfwGb_Fw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_4_ArpSxEQo29V4AfwGb_Fw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 12 Feb 2021 12:20:10 -0500</pubDate></item><item><title><![CDATA[WFH: The New Normal]]></title><link>https://www.cloud9advisers.com/News/post/wfh-the-new-normal</link><description><![CDATA[Business continuity is important during these weird times. Enabling work-from-home (WFH) technologies for staff will be important. There are many offering free tools and solutions with extended free trials. But it is still important to evaluate your options, even if only temporary.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_9GNMudVhRrmv8wV2GFFVcg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_HvqwxRFfTO-Bh_5DitwxTw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_VCyb9GLESvmca-UXRbx9Cg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_VkU_xnvASWKZ--18HxUtbA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_VkU_xnvASWKZ--18HxUtbA"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true">Remote Workforce Enablement</h1></div>
<div data-element-id="elm_lCz5ZrQYnoFR8GGk9ODq8Q" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_lCz5ZrQYnoFR8GGk9ODq8Q"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1579781403337-de692320718a?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_6JbaV7aPS0y1UWflH12QOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6JbaV7aPS0y1UWflH12QOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:rgb(45, 11, 11);">Business continuity is important during these weird times. One of those continuity efforts will be to enable work-from-home (WFH) technologies for staff. There are many companies offering tools and solutions with extended free trials and numerous options to allow seamless WHF options. But it is still important to evaluate and make sure you get the right solution, even if only temporary. Many of these companies are already members of our Supplier Portfolio and we've worked with them routinely in less stressful times so we know the ropes and how to avoid the hurdles. We can help you navigate the rough seas ahead.&nbsp;</span><br></p><p><span style="color:rgb(45, 11, 11);"><br></span></p><p><span style="color:rgb(45, 11, 11);">This will new uncharted territory for many of your staff. Working at home may present challenges they've never considered important wih their environment, family members, and their home network.&nbsp;</span></p></div>
</div><div data-element-id="elm_w3iN_XNYiDxtbFFD46gqVw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_w3iN_XNYiDxtbFFD46gqVw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_XRVQmn3chnZmj630P_iC3Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_XRVQmn3chnZmj630P_iC3Q"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_4gSuw558jgRAdNNOo848JA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_4gSuw558jgRAdNNOo848JA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Enable your remote workforce the right way.</h2></div>
<div data-element-id="elm_t1DKdJqYTQYDuQqd3yryqw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_t1DKdJqYTQYDuQqd3yryqw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span>Educate.&nbsp;</span></p><p><span>Equip.&nbsp;</span></p><p><span>Connect.&nbsp;</span></p><p><span>Communicate.&nbsp;</span></p><p><span><br></span></p><p><span>Work-From-Home declarations from the CDC and other local and federal government agencies may become new temporary law. Not only will it wind up being the new normal, but it might just be the safest way to protect your staff and the vulnerable from illness. Doing it right will be critical to business continuity and the bottom line. So how can your business prepare to transition your workforce into a work-from-home (WFH) team that can continue to perform at a high level?</span></p></div>
</div><div data-element-id="elm_36AZ0RtH7U5GkGCoJjnyqA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_36AZ0RtH7U5GkGCoJjnyqA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-weight:bold;font-size:18px;">1. High-Speed Internet at home; Tips &amp; Tricks</span></p><p><span style="font-size:15px;"><br></span></p><p><span style="font-size:15px;">The first thing on the list is good high-speed internet at home for each employee. Do a quick survey of all staff for more details...&nbsp;<br></span></p><ul><li><span>Ask about their WiFi. Can they control and prioritize specific devices? Do they have a wired connection in their home office space?&nbsp;</span></li><li><span>Ask about smart-home devices (Ring, Nest, etc). These devices tend to eat up bandwidth.</span></li><li><span>Ask staff to run a speedtest at home—simply, search on Google, “internet speed test”, then click “run speed test”.&nbsp;</span></li><li><span>A good rule-of-thumb is at least 10Mbps/active user, that’s both download <span style="font-style:italic;">and </span>upload speed. Upload speeds become much more important at home when considering business applications, especially voice and video. If your at home talking on your business phone app, that's&nbsp;<span style="font-style:italic;">upload<span style="font-style:normal;">. If your caller says you sound &quot;choppy&quot; it is most likely your upload speed is lacking.&nbsp;</span></span></span><br></li><li><span>Keep in mind: the spouse and the kids will be home for a while too. Their spouse may be in the same boat and the kids may also need bandwidth for school. Prioritization and control of the bandwidth will be important.</span></li><li><span>Further keep in mind that everyone else in your employee's entire neighborhood is likely doing the same thing; working-from-home. This can be especially challenging for most broadband cable networks, all of which are shared.</span></li><li><span>Consider an additional reimbursement so staff can boost their internet speed.&nbsp;</span></li><li><span>If necessary, consider adding 4G Mobile hotspots for some employees to take home. They can be added to your corporate wireless carrier account. Satellite and other Wireless ISP solutions are available for remote staff without traditional broadband options at home.</span></li></ul></div>
</div><div data-element-id="elm_RygXfgS2GDNUl2nUSEy1cA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_RygXfgS2GDNUl2nUSEy1cA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-weight:bold;font-size:18px;">2.&nbsp; &nbsp;Move to a Cloud-based Phone System</span></p><p><span style="font-size:15px;">&nbsp;</span></p><p><span style="font-size:15px;">You’ll want to migrate to a cloud-based phone system and leverage the benefits of unified communications that will give all users:</span></p><ul><li><span>Virtual/online meetings: audio, video, screenshare</span></li><li><span>Desktop and/or Mobile app: make/take calls from anywhere as if in the office</span></li><li><span>Virtual Faxing</span></li><li><span>Business SMS texting</span></li><li><span>Collaboration/Team Chat/Messaging: reduce annoying email chains, keep things simpler</span></li><li><span>CRM and other important integrations</span></li></ul><div><span style="font-weight:bold;">Special note</span>: if your internet connection is a little sluggish at times, because everyone else in the neighborhood is using it too, many UCaaS solutions have a special feature where users can continue to use the softphone app to make/take calls, but the talk path itself can be separated and go over a landline or mobile device so voice quality doesn't suffer. Call control remains on the softphone (your business ext./line) so you can transfer, hold, conference, etc., but the talk-path is separated so it doesn't have to go over the same internet connection.&nbsp;</div><p><span style="font-size:15px;">&nbsp;</span></p><p><span style="font-weight:bold;">Another note:</span>&nbsp;If your business isn't ready to move to a cloud phone system, consider a Live-Answer Virtual Receptionist service. Call Cloud 9 to help you find the right one for your business.</p><p><span style="font-size:15px;"><br></span></p><p><span style="font-weight:bold;font-size:18px;">3.&nbsp; &nbsp;Move to a Cloud-based Contact Center</span></p><p><span style="font-size:15px;"><br> Does your business have an in-office call center, contact center, or helpdesk? A cloud contact center solution allows agents to effectively and efficiently work from anywhere. Supervisors have all the same tools (if not more) and complete visibility to help support agents and other staff. Also see all of the benefits of number 2 above. A</span></p></div>
</div><div data-element-id="elm_r4_IJFqLGIB5zfAbm32ZWQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_r4_IJFqLGIB5zfAbm32ZWQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-weight:bold;font-size:18px;">4.&nbsp; &nbsp;Migrate to Cloud Workspaces</span></p><p><span style="font-size:15px;">&nbsp;</span></p><p><span style="font-size:15px;">The right Workspace as a Service (WaaS) solution allows your business to continue and maintain hyper-control over security, access, software, data, file sharing and other IT rules and policies without the need for cumbersome and annoyingly sensitive VPNs. </span></p><p><span style="font-size:15px;">&nbsp;</span></p><p><span style="font-size:15px;">Move all staff workstations and literally your entire business LAN / WAN to the cloud. An entire business environment can be spun up in days, New users can be spun up in minutes. Staff can access the new “cloud” LAN and their Windows-based cloud workstation from any device, anywhere: PC, Mac, Chromebook, even a tablet or smartphone. </span></p><p><span style="font-size:15px;"><br></span></p><ul><li><span>Windows 10 Pro included</span></li><li><span>Full Active Directory integration</span></li><li><span>Workstation-level helpdesk included</span></li><li><span>Drag-and-drop, “App-Store” style admin portal</span></li><li><span>All s/w applications preloaded/provisioned; end-user workstation ready for use in minutes</span></li><li><span>Multi-Factor Authentication available</span></li><li><span>Shared Storage/File sharing, up to 10TB</span></li><li><span>High-compute / high-GPU workstations available</span></li></ul><div><br></div><div>May sound complicated, but we assure you, it is insanely simple, and insanely fast!</div></div>
</div><div data-element-id="elm_d5-eH0eakCkSoa_Gz9u6LA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_d5-eH0eakCkSoa_Gz9u6LA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:15px;font-weight:bold;">&nbsp;5.&nbsp; &nbsp;Remote File Sharing</span></p><p><span style="font-size:15px;">&nbsp;</span></p><p><span style="font-size:15px;">When working from home, staff must be able to access, share, store, and collaborate on important files. <br> Popular solutions include:</span></p><ul><li><span>Microsoft Office365: OneDrive, SharePoint</span></li><li><span>Google G Suite: Google Drive</span></li><li><span>Box.com, Dropbox.com</span></li><li><span>Team Chat/Messaging apps, found with many top cloud communications solutions, also have simple and easy to use file-sharing capabilities.</span></li></ul><p><span style="font-size:15px;">&nbsp;</span></p><p><span style="font-size:15px;">&nbsp;</span></p><p><span style="font-weight:bold;font-size:18px;">6.&nbsp; &nbsp;Identify &amp; Provide Necessary Equipment</span></p><p><span style="font-size:15px;">&nbsp;</span></p><p><span style="font-size:15px;">Make sure your employees have the tools, devices, and equipment they need to perform at their best.&nbsp;</span></p><ul><li><span>Mobile phone, mobile app, or softphone</span></li><li><span>Desktop or laptop PC</span></li><li><span>Chromebook (in cases of WaaS/DaaS solution above)</span></li><li><span>USB or Bluetooth headset</span></li><li><span>Simple/easy USB speakerphone</span></li><li>And, never underestimate the power of a white-noise machine. <br>Especially for all the work-from-home parents!<br></li></ul></div>
</div></div><div data-element-id="elm_EfSBt-DlaRzlSQzatJgjwQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_EfSBt-DlaRzlSQzatJgjwQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_uYUVdCXdAEESnE2-jxAl0w" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_uYUVdCXdAEESnE2-jxAl0w"].zpelem-imagetext{ border-style:dotted; border-color:#000000 !important; border-width:1px; border-radius:10px; padding:10px; margin-block-start:428px; } </style><div data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-center zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" data-lightbox="true" style="width:1800px;padding:0px;margin:0px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><div>Many of the vendors in our <a href="/suppliers" title="Supplier Portfolio">Supplier Portfolio</a> are offering free plans and extended free-trials.&nbsp;<br></div></div><p><span><br></span></p><div>If you need assistance putting together any of these suggestions and a strong technology plan to enable your new remote workforce and get it up and running quickly, smoothly, and securely, contact us. We’ll get you in touch with a strategic adviser, right away.</div><ul><li>We don’t sell anything<br></li><li>We don’t charge clients<br></li><li>And, we never get paid by vendors, directly<br></li><li>The distributors pay our fees</li></ul><p><span style="color:inherit;"></span></p><div>Contact Cloud 9: trusted, strategic partners, and technology advisers.</div></div>
</div></div><div data-element-id="elm_OadUj-ykHqE1VNk9ualcqQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_OadUj-ykHqE1VNk9ualcqQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-full-width " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like some help setting up WFM solutions" title="email us: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Contact Cloud 9 for help!</span></a></div>
</div></div></div><div data-element-id="elm_ZEnjunGThbdZMS-nDTDzIg" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_ZEnjunGThbdZMS-nDTDzIg"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_YelP0odilkehD04mo7DF7w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_YelP0odilkehD04mo7DF7w"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;"><div>How fast can you transition?</div></span></h2></div>
<div data-element-id="elm_u7WctIlJ3GQE9JeLtOPpxw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_u7WctIlJ3GQE9JeLtOPpxw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Many of the vendors in our Supplier Portfolio are offering free plans and extended free-trials.&nbsp;<br></div><p><span style="color:inherit;"><br></span></p><div>If you need assistance putting together any of these suggestions and a strong technology plan to enable your new remote workforce and get it up and running quickly, smoothly, and securely, contact us. We’ll get you in touch with a strategic adviser, right away.</div><ul><li>We don’t sell anything<br></li><li>We don’t charge clients<br></li><li>And, we never get paid by vendors, directly<br></li><li>The distributors pay our fees</li></ul><p><br></p><div>Contact Cloud 9: trusted, strategic partners, and technology advisers.</div></div>
</div><div data-element-id="elm_ZUXdCERgQNDZDdPRWnqMaA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_ZUXdCERgQNDZDdPRWnqMaA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_Tds2uA2e6l-3ccDXQ7fAWg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Tds2uA2e6l-3ccDXQ7fAWg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_9-jdXbahtksaRoJ829cSrg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_9-jdXbahtksaRoJ829cSrg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-outline zpbutton-full-width " href="/Downloads/C9%20-%20Remote%20Staff%20Readiness.pdf" download><span class="zpbutton-content">Download the guide (PDF)</span></a></div>
</div></div><div data-element-id="elm_FmgfTwSBRbwjTNbYNAymUg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_FmgfTwSBRbwjTNbYNAymUg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_y9Rxc7D5XSgE-Sd5iRlf4g" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_y9Rxc7D5XSgE-Sd5iRlf4g"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-full-width " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like some help setting up WFM solutions" title="email us: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Contact Cloud 9 for help!</span></a></div>
</div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 19 Mar 2020 17:00:49 -0500</pubDate></item></channel></rss>