Nasstar explores how to make your digital workspace a success
The digital workspace is a solution that enables employees to access the systems and tools they need from any device—smartphone, tablet, laptop, or desktop—regardless of location. However, when it comes to the digital workspace, there are three pillars you need to balance: productivity, security and disaster recovery. If you can get these three pillars right then your digital workspace is sure to be successful.
The first pillar to look at is productivity as this is often the core reason a company will decide to make the switch. A good digital workspace can make people more efficient at their jobs in many ways.
Firstly, there’s the redesign of the desktop. Removing all the useless junk that doesn’t help staff complete a task and replacing it with tools that will make things simpler and allow for greater collaboration.
Secondly, there’s improved flexibility. It cuts down on wasted time; there’s no need to lose hours to travel as you can either get work done on the go or merely use software such as Microsoft Teams for video or audio calls to talk to people from your home, so you can avoid the daily commuter grind. If there is an emergency or a sudden deadline you can go from an empty office to a full team in the time it takes to send an email.
The second pillar is security and it is perhaps the most important of all three. An excellent digital workspace closes a lot of the gap’s cybercriminals could previously exploit by using a comprehensive cybercrime strategy.
For instance, before using a digital workspace if an employee wanted to take their work home with them, they would have to copy it onto a device and then transfer it to their home computer. This not only opens the company up to the home computer being hacked but the device used to copy the data can be stolen or lost. Instead of this a digital workspace can be accessed from home by using cloud service which significantly cuts down on cybersecurity risks.
A digital workspace also allows you to update software automatically rather than allowing it to be delayed by users. This is important as hackers often use flaws that have already been found and patched out, but the hackers rely on people being lazy to give them an opening.
The last pillar is the one you don’t want to have to use but is necessary because you must assume everything can potently fail. You might be of the assumption that recovering from failure is not your problem but the responsibility of your service provider - WRONG!
Take for example, Microsoft Azure, which is used in a lot of Microsoft's products such as Office 365, suffered a massive failure that lasted for over 24 hours, due to bad weather.
A lightning strike took down the cooling systems of one of Microsoft's South Central US data centres which forced it to shut down. This loss of a data centre didn’t just affect America but also Europe and South America. After bringing the data centre mostly back online, services continued to experience issues for several days.
This issue shows the underlying problem with the thinking that disaster recovery is someone else's problem. Using cloud services doesn't mean you'll never suffer from IT related issues ever again, however big and impressive the firm you plan to use.
For more information on anything in this article, please contact Mark Flynn.