REMOTE WORKING

Know the 3 key areas of successful remote working

Can you get to all the information you need to do your job? Do review and approval processes still work? Are reminders and escalations sent out automatically? Are you always sure you’re using the right version of an important document?

If the anwser is “no” to any of these, then you need to upgrade your remote working experience now!

Remote Working in Action

Remote Working – 3 Key Areas

The three key areas of successful remote working are security, access and collaboration.

So what are the main pain points to address and risks to mitigate when working remotely with your business information? There are three key areas to consider.

SECURITY

Security policies, procedures, and controls define how content is made available to whom and under what circumstances. The security function is about managing risk.

INFORMATION SECURITY

ACCESS

Remote working only works if you can access, find, and use all the information you need to do your job. Having access to business information is about productivity.

INFORMATION ACCESS

COLLABORATION

Many document-centric business processes span departments. You need active collaboration among departments to be efficient and in control.

PROCESS COLLABORATION

Security Considerations

When you remotely access company information – financial information, customer contracts, HR records – you need to do so securely. Your company should have clear information governance policies, procedures, and controls that protect information assets so only authorized users can access information.

Information moves around

At any given time, digital information is in one of three states: At rest (e.g., on hard drive, server, etc.), in use (read, edited) or in motion – as in, moving over a network. Eash state has its security considerations.

AT REST

Protect information at rest with authorization. Information at rest includes business documents and associated metadata. The IT and IG functions define, enforce, and audit the security measures that allow authorized users to access remote  file servers, databases, and cloud-hosted systems

IN USE

Protect information in use by securing the endpoint. Information in use is content or documents being viewed or edited at an “endpoint” – a computer – using software (a document open in Excel or Word), in a web browser (a PDF) or on a mobile device (content in an app). Keep every device used to access business info up to date with the latest security updates.

IN MOTION

Protect information in motion with a VPN and/or encryption. Information in motion refers to content or documents traveling over a network or the Internet between the “at rest” remote location and an “in use” endpoint location. Information traveling over an Internet connection should be encrypted (over HTTPS) and/or accessed using a VPN.

WFH security considerations

Access Considerations

Security policies and controls protect help protect information by securing information by using hardware and software and by adopting security standards. The second consideration is how to give authorized users access information they need to do their jobs.

WFH access considerations

Security policies drive information access

A role (manager) belongs to a group (AP approver), which has permissions (approve AP invoices) based on rules (all invoices over $20k require manager approval).

ROLES

A role is associated with one or more business processes. Asign users to roles and roles to groups because people may leave, be promoted, change departments, etc., but the role stays the same.

GROUPS

Groups are associated with departments (Accounting), functions (AP approval), and locations (Northeast). A role may belong to one or more groups. Functional groups may span departments.

PERMISSIONS

Permissions are assigned to roles and groups and should be based on the principle of least privilege, which is “privilege levels no higher than necessary to accomplish required organizational missions/business functions”

Collaboration Considerations

What good is secure access if you can’t collaborate with co-workers on business processes?

Get work done faster

The days of walking over to accouting to check on an invoice are over. Remote work requires new processes that support digital collaboration across departments and functional areas.

PROCESS AUTOMATION

Remote processes in particular should be as automated as possible and should “go analog” when a business rule gets triggered. Manage routing, escalation, multi-level approvals and more using process automation to keep work flowing.

CROSS-DEPARTMENT

Business information and processes span departments. So information-related processes that require collaboration – like AP approvals – are most effective when roles (manager) are assigned to departmental groups (IT, HR) and fuctional groups (AP approver).

NOTIFICATIONS

Everyone gets a lot of information every day. Email. Chat. Text. Sometimes tasks slip through the cracks, so look for a solution that lets you prioritize tasks, has task reminders, and supports both sequential and parallel workflows.

WFH collaboration considerations

Cloud Content Management

If you need a secure, collaborative platform where your employees can remotely access and work with key business information, consider the Cloud Content Management SaaS solution from Ovitas.

LEARN MORE