Categories
Blog

Employee Monitoring | Best Practices in 2021

Employee monitoring has become a more common question as so many companies move to remote work environments. How do you make sure that your employees are being as productive as they could be? How important is employee monitoring? Does my company need to invest in solutions?

When you consider employee monitoring for productivity, there are other ways to manage employees that might be more beneficial. There are downsides to monitoring. You don’t want to invest in technology that logs your employees to the point that you’re micromanaging them or making them feel negatively toward the company. If you’re concerned about productivity when employees are working remotely, the statistics seem to indicate the opposite is true. 77% of remote workers indicate that they are more productive and 80% experience less stress.

Productivity is not the only reason to monitor your employees. Data breaches are also a concern, and it’s important for companies to realize that most cybersecurity risks are associated with employee use and misuse. This is not usually intentional. However, having protocols in place to be able to log and control employee access to your sensitive data provides a way for you to track issues and guard against threats.

Should You Invest in Employee Monitoring?

This isn’t a one-size-fits-all question. Some companies do well with different types of monitoring. For larger enterprises, a data environment that allows your team to grant authority, or access, based on the employee’s needs for certain data can be an excellent benefit. It’s unobtrusive but serves to log all access and changes to documentation, which provides exactly what you need to delineate responsibility.

For smaller companies, there are many types of software that are developed specifically to monitor employee use. Some of these options take screenshots and even use the webcam to take images. As you might imagine, some of these options can seem fairly off-putting to employees. For most companies, it can be an excellent idea to discuss these monitoring options internally and to get a good understanding of how staff members feel about them. You don’t want to increase employee turnover rates in your quest to improve productivity. A staff that’s happy often works much harder and is more productive, so there is a balance in this decision-making process.

The danger in using very invasive monitoring is that your employees may not feel comfortable with that level of oversight in their homes. It’s also often unnecessary. If managers are screenshotting every time an employee is away from their desk, the employee may feel over-monitored, and it can damage performance. A Harvard Business Review article on the topic indicated that heavy surveillance can damage trust between the company and employees and went on to explain that only 30% of executives believed the data would be used responsibly.

However, with that caveat in place, there are many monitoring options that are unobtrusive and excellent to help with productivity and cybersecurity.

Types of Employee Monitoring

Many of the software and tools you currently use do allow some level of oversight. If your employee is in your company’s database, you should be able to log who they are and what they’re accessing. There are also many tools available. Here, we’ll discuss a few options.

  • Microsoft Teams. Microsoft Teams is an excellent organizational tool. It wasn’t developed to monitor activity, but you can use the features to do just that. The Microsoft usage reports and teams reports can help you form a good picture of productivity and use within the Teams environment.
  • Monitoring Software. There are many types of monitoring software available, and we’re not going to do any specific reviews here. However, we can make recommendations for the best options, if this is something you’d like to add. Employers are not the only ones using monitoring software. As schools and Universities went online for the pandemic, many made monitoring software mandatory for students, as well. Each of the offerings is slightly different, but most of these applications are installed on the device, and they record information. This might include recording what tabs are open, what pages the user is looking at, monitoring keystrokes, and even turning on the camera to take video and still-frame images. Many of these options also allow you to retrieve screenshots.
  • Phone Monitoring. Phone monitoring can be an excellent addition because it allows you to collect and use data that would otherwise be lost if the employee didn’t note it anywhere in the customer’s files. Many VoIP systems have extensive reporting options to help you collect data through this communication method.
  • Microsoft 365 Reporting. There are many reports that could be helpful for the employee and employer including:
  1. Email Activity by User
  2. Contacts Activity
  3. Calendar Log Events and many others

Are You Looking for Managed IT Services in the Dallas and Fort Worth area

At Data Magic Inc , we provide robust managed IT services to help our clients make the best decisions when it comes to their technology solutions. If you’re currently interested in learning more about employee monitoring, give us a call. We’re happy to assess your current processes and make recommendations that work for your specific business model.

Every company is different. With new hybrid and remote work models becoming more popular, it’s important to make sure that your cybersecurity is strong and that your staff is well-trained for this new environment.

Any lingering questions? Reach out below!

Categories
Blog

How to Transition to Co-Managed IT [2021]

Why are business leaders choosing Co-Managed IT in 2021?

There is a shift happening in the marketplace where businesses are increasingly choosing to outsource specific roles to Managed Service Providers. There is a realization that it is not effective for larger entities to outsource all IT roles. After 100+ endpoints, it’s important to have an internal IT manager or team. However, the IT budget does not always grow as fast as the IT department needs to. Therefore, IT leaders are choosing to outsource certain tasks to ensure the organization can have the proper technical support while sticking to its allocated budget.

Shifting to Co-Managed IT can seem like a daunting task. Our goal with this guide is to give you the tools you need to be successful in this transition.

Step 1: Evaluate multiple providers

This is without a doubt the most important aspect of transitioning. See our E-Book on 10 Questions to Ask a Potential Co-Managed IT Firm in 2021 for some ideas on the interview process. In addition to these questions, consider the below points:

  1. Evaluate at least 3 providers – You want to make sure there are a wide variety of plans and proposals presented. It’s also recommended to have at least 2 meetings per group that you are considering. Anyone can fake the first meeting. Ask them the direct questions found in the E-book. Spending enough time with the individuals at each organization and uncover the good, the bad, and the ugly.
  2. Go visit their office – Go look around. Is the office a mad house? Is it organized and efficient? How is the physical security? This tip can reveal a lot about the management and employees at a potential provider.
  3. Ask to speak with an engineer – The level 3 engineers are going to be the most honest individuals you may ever meet. They usually don’t care about the sales process and will tell it how it is; a great way to get some honest expectations around working with this provider.
  4. Always get references – This is a must! Get at least 3 references (ideally more) and actually call those individuals. This should be nonnegotiable.

Step 2: Clearly define Outsourced/Augmented IT role before agreement begins

When you fully outsource your IT operations to a Managed Service Provider (MSP), they assume all responsibility of an organization’s IT infrastructure and network security. However, as a business gets larger, it will not make sense to outsource ALL roles. However, it also won’t make financial sense to bring everything in-house (usually). So, a mixture is not only common, but growing in popularity. This mixture will require the company leadership, in-house IT, and outsourced IT to set clear expectations of roles.

Here are some examples of clearly outlining outsourced roles:

  • Server management: Changes made to the server, security audits, updates, and migrations are done by the MSP.
  • Backup and Disaster Recovery: The MSP manages the data backups onsite and offsite. They monitor, test restore, and all the other plethora of items associated with data redundancy.
  • Level 1, 2, or 3 help desk: Outsource lower level or higher-level help desk tickets to the MSP.

I’m sure you can see why internal IT departments outsource. Imagine the backup scenario, for instance. In-house, you may need a dedicated individual for that one role. That is a big expense for just one role. The other option is to have them take on additional roles. That’s great, but that spreads them thinner which will inevitably lead to a ball being dropped. Unfortunately, the ball cannot be dropped even once when it comes to data backup or network security. Too much at stake.

Step 3: Onboarding with a new IT company 

This is a critical part in the process. You may have been blown away by the sales process/person, but now it’s time to see if the organization can back it up. On the flip side, the sales process may have completely sucked but you decided to give the provider a try anyway. Just because an organization puts a lot of time and effort in sales does not necessarily mean they will put the same level into their service, and vice versa. This phase will flip the rocks to see what’s under the nice haircut and polished presentation.

Factors to consider:

  1. Is there a clear timeline and expectation for onboarding?
  2. Did they meet or exceed this expectation?
  3. Were you informed and comfortable with every step in the process?
  4. How was communication? If communication and response is not quick in the “new client” phase, you better believe it will not get any better.
  5. Did the provider provide excellent recommendations to improve your workflow, or did they just provide recommendations that will make them more money and do very little for your productivity?

Here is the unfortunate truth: If anything is dropped, delayed, or unsatisfactory during onboarding you need to understand that’s probably not an anomaly and may be present for the remainder of your partnership. If multiple items went wrong, then you have a critical question to ask yourself: Do you halt the transition and restart the process at Step 1? Or are you going to be okay with the level of response and attention to detail that you received during onboarding?

If the onboarding is smooth, communication is on point, recommendations are helpful, and the timeline is met, then congratulations! You probably found the right Co-Managed IT Firm.

Bonus Tips for a successful transition to a Co-Managed IT Firm:

  1. Speaking from experience again, Managed Service Providers usually love Co-Managed IT partnerships. It frees them up to handle very specific roles for the client which makes them more efficient, and profitable, overall. Because of this, they are often willing to come down slightly on their typical managed service price. Whether this is the per workstation, user, or server price. See the full article on Managed Service Pricing HERE. Granted, you don’t want to push them too hard on the price. If you think they are the right fit, it’s not worth starting the partnership on a bad foot by requesting drastic adjustments or ultimatums.
  2. Tool kit! A good MSP has a ridiculous number of security, network mapping, and other productivity tools they utilize to support their customers. Oftentimes, it’s cost prohibitive for an-house IT to purchase some of these tools. Since MSPs support so many endpoints, their per device price goes down quite a bit. Usually, they will have little to no problem providing access to some or all these tools. This can provide a significant value proposition for your internal IT. So, make sure to ask the provider what tools they will utilize to support your organization and see if your team will be able to leverage any of them.

If you have any questions about transitioning to a Co-Managed IT Firm, please send us an email at datamagic@datamagicinc.com.

Thank you!

Categories
Blog Technology News

Cybersecurity Infographic Layers for Businesses in 2021

Cybersecurity Layers in 2021

Cybersecurity is evolving at a rapid pace. When most business owners think about Cybersecurity (if they’re thinking about it), they usually think of something overly complex. They either ignore it completely, or they may overpay for some cybersecurity firm to give them a sheet of paper once a year so they can check a box on a compliance report.

The reality is that cybersecurity is pretty simple. Most breaches in the small and medium-size business space happen because common sense security measures were not in place.

Cybersecurity is all about layers. If you have enough of the important layers in place, you’ll be fine.

To visualize just how simple Cybersecurity can be, we created this 15 point cybersecurity infographic checklist. Feel free to take this checklist and ask your IT team if they have each of them covered.

cyber security infographic

If you prefer PDF, here is a link to download the checklist: 15 Critical Cybersecurity Layers for Businesses in 2021

How much does Cybersecurity Cost in 2021?

Many of the layers in this checklist, such as Multi-Factor Authentication, computer updates, and strong passwords, should be very little to no cost. Nearly every other item on this checklist does have a monthly cost associated. Some are dependent on the number of users; others are per server or amount of data. However, you can implement all of these layers at a very reasonable investment in 2021.

The reality is that the price will vary greatly depending on the IT provider you use and the vendors they set up and manage. However, Cybersecurity is a buzz word that is getting a lot of attention and some inflated prices. So be wary of extensive per number quotes for cybersecurity. Have the provider check each of these boxes and outline the cost of each of these line items. That will prevent them from “bundling” everything into an overly expensive security package.

$50 per month per user should be more than enough time to get the premium version of all of the items on this checklist. Use this as a guide rather than a direct quote. If the provider is way below or above this, something is off. Of course, there will also be a support cause for computers and servers that are usually separate from the quote’s security layers.

How to Get Started with Cybersecurity

There are a few options to get started right away:

  1. Give your IT provider this checklist and make sure they are checking all the boxes.
  2. If you do not have a provider, reach out to Data Magic Inc. We will provide transparent guidance to get you where you need to secure your business data.
  3. Get a Free Network Security Assessment. This is not just some sales tools. Our free assessment gives you tons of actionable data to get you started on your cybersecurity journey!

Have a question? Reach out anytime at 469-635-5500.

Skip to content