7 Steps IT Departments Need to Take Now to Manage a Telecommuting Spike

My Post - 2020-03-16T160152.449.pngThe coronavirus has many businesses telling their employees to work from home for the foreseeable future. These are the steps IT needs to take to manage this sudden surge of telecommuters.

To stem the spread of the coronavirus, many companies in the New York area this week have begun allowing employees to work from home; a few have even insisted on it. If your company hasn’t yet made this move, know that it probably will happen, likely sooner rather than later. For IT professionals, this means a very large and sudden spike in the number of remote workers and telecommuters they’ll need to manage.

While most companies these days support a certain number of telecommuters, moving all workloads to that model, even temporarily, can be challenging. Below are seven steps IT pros can follow to help make this transition easier and keep their infrastructure running reliably despite a shift in user location.

Take Another Look at Your Telecommuting Policy

Your existing policy was probably written with the idea that telecommuting is a special consideration offered to certain employees. It probably required telecommuters to sign additional usage agreements for company infrastructure and service access, especially as it related to family members. Now, however, telecommuting will likely be mandatory for many employees and the IT department when it comes to support. Look over your telecommuting and security policies and decide how this will affect expectations and requirements.

Protecting company assets from casual use by employee family members should probably remain a requirement, for example. But how will this surge in telecommuters affect not only IT’s expected support response time, but the help desk and trouble reporting process in its entirety? If employees will be required to take more corporate devices home – and therefore more potentially valuable corporate data – how will the new situation affect their responsibilities when it comes to device and data security? – Read more

Leave a Reply