fbpx

How should I prepare for a successful video meeting?

How should I prepare for a successful video meeting?

How should I prepare for a successful video meeting?

FORE! A technophobe has just joined the video meeting 

Before COVID-19 drove us all indoors, I enjoyed the occasional game of golf. Golf has a somewhat stuffy reputation, with some justification. It is particularly well known for its mysterious etiquette, a set of usually unwritten rules, completely separate to the technical rules of the sport but apparently almost equally important. Players are expected to observe this etiquette or face some very severe tutting and muttering. Woe betide you if you tread on the line of another player’s putt. 

Golf is very long established game, so the etiquette has had time to evolve and become part of the game’s culture. Whatever your opinion of its principles, it certainly does create a consistent level of behaviour recognisable in clubs across the world. And much of it is well intended, for example to prevent slow play and show some respect for your fellow golfers. 

Video conferencing by contrast is a very young sport. It has recently experienced an explosion in new players thanks to COVID-19 and extensive home working. People are joining clubs such as Zoom, Teams and Skype and heading off ill prepared for 18 holes. If this were a real golf club, the impact would be quite anarchic and frightening – a load of novices turning up on the first tee with little experience, dodgy equipment and dubious technique. Balls flying in all directions, a few broken windows in the clubhouse and fury in the members’ bar as etiquette disintegrates.  Read More

If you found this article useful, then please share for others

What are the benefits of hiring an IT Director?

What are the benefits of hiring an IT Director?

What are the benefits of hiring an IT Director?

How important is IT to your company?

Consider for just a few moments the importance of computer systems to your company’s success.  Here’s a few specific questions to help you weigh it up:

  • If your IT stops working, how quickly is the pain felt?
    • How quickly can you recover if things do go wrong?
  • Are you confident you are aware of relevant technological solutions which could help you be more successful?
    • Sell more?
    • Understand your customers / potential customers better?
    • Supply your goods / services more productively and cost effectively?
  • Is technology a propeller or an anchor in your business?
    • Are you investing in the right technology?
    • Are you making the most out of the technology you have already bought?
    • Are you getting value for money from your IT spend?
  • Are you confident that your company is well protected from cyber crime?

Read More

If you found this article useful, then please share for others

The leaver: gone – but too often forgotten

The leaver: gone – but too often forgotten

The leaver: gone – but too often forgotten

You’ve had the farewell drinks. You’ve signed the ‘Good luck’ card and wished your soon to be former colleague well in their new role.

It’s unlikely the next thing you do is tell them to keep a spare set of keys for their company car and pop back any time they like to have a spin.

No one would dream of being this lax with their physical assets when an employee leaves their company

It is astonishing how many firms are not similarly vigilant when it comes to their digital assets. For example, do you know how many of your former employees still have login details for your main corporate Wi-Fi network? If not, it is a cyber equivalent of having a pool of unauthorised key holders for the company car fleet. There could be little to prevent those past colleagues standing outside the building and having a quick surf to see what they can find. If they feel aggrieved over the circumstances of their departure, that risk may be increased. Read More

If you found this article useful, then please share for others

Why is two factor authentication important?

Why is two factor authentication important?

Two factor authentication (MFA) – little pain, big gain

The rise and rise of the cloud

The use of cloud computing continues to grow rapidly. Packages such as Microsoft Office 365 and Google G Suite are very widely used across businesses of all sizes for a multitude of purposes, including e-mail, file storage and file sharing.

Legislative requirements are also driving wider adoption of functionally specific software, including cloud accounting to meet HMRC’s ‘Making Tax Digital’ requirements. Many businesses will be familiar with well known packages such as Xero and QuickBooks Online.

Popular, but also a target

Read More

If you found this article useful, then please share for others

What should be included in a business continuity plan?

What should be included in a business continuity plan?

What should be included in a business continuity plan?

Unpalatable, but predictable

You’ll be glad to know this isn’t another Coronavirus article. Businesses have been faced with severe threats to their survival long before anyone had heard of COVID-19 – floods, fires and other localised disruptions are not new. Pandemics do remind us however that unpalatable events can and will happen.

COVID-19 is unusual in recent history because its consequences for business have been so severe and so widely felt. And it brings into sharp focus the relationship between likelihood and impact. Once in a lifetime events are, by definition, very rare. But when they do strike the pain can be relatively high. We may be less able, or perhaps less willing (sometimes with justifiable good reason), to prepare. And – yes – let’s be honest – that justification may be that reducing the risk is prohibitively expensive and we decide therefore that it is a risk worth taking. Read More

If you found this article useful, then please share for others

1 2 3 4