sb-nz logo
Story image

Distributed workforces pose new challenges for information management

12 Aug 2020

Information management company M-Files has outlined information management considerations for the rise of the distributed workforce, as many organisations progress through lockdowns and many employees opting to work from home long-term.

According to M-Files research, 52% of workers globally work from home at least once per week, and 65% say they work best from home.

To make use of that productivity, organisations should ideally have robust information management in place as inefficiencies could cost as much as US$20,000 (NZ$30,264) per worker, per year.

M-Files partner and alliance manager Chris Smith explains that information management often presents a common conundrum: organisations don’t know what they don’t know.

“For example, they may think it’s fine that employees send documents via email or make them available externally via online sharing tools; however, this creates significant security concerns as well as making it difficult for team members to know where to find the latest version of important documents. 

“Collaboration can be stymied, mistakes can be made, and organisations can suffer data breaches if they don’t immediately address the issue of how employees are accessing and sharing information while working remotely.”

Remote document sharing is not subjected to the same security protocols – such as firewalls – as corporate networks. Employees are also saving documents in different, siloed locations and shared through different means.

M-Files believes that these methods do not guarantee data accuracy or data security.

“Businesses may have scrambled to facilitate remote working in the early stages of COVID-19 lockdowns, and this was necessary to keep operations functioning,” says Smith. 

He believes organisations should consider whether these solutions can cope long-term, as it is likely they have introduced new security risks. 

“Organisations should consider implementing a smart intelligent information management (IIM) solution delivered by a reputable provider. The right solution can deliver fast time to value, strong return on investment, and a long-term approach to remote working that benefits both the business and its employees,” continues Smith.

Businesses can address these concerns with a modern, intelligent, cloud-based, and enterprise-grade IIM.

A purpose-built system includes built-in security measures that maintain strong data security while helping to improve productivity for remote employees.

An IIM solution could offer five key benefits, including:

1. A smart security system that maintains data security and integrity.
2. Traceability and auditability that minimises the risk of errors.
3. Smart search features that eliminate the time that is wasted on looking for documents.
4. Automated business processes that keep information flowing.
5. A cloud-based deployment that removes the need for on-premise infrastructure.

Story image
IronNet expands Asia Pacific presence with new strategic partnership
“The combination of M.Tech’s extensive network in Asia Pacific and our unparalleled expertise in threat intelligence and detection will help more enterprises across the region to proactively identify and take down known and unknown threats before they happen.”More
Story image
Huawei: Corporates must focus on data minimisation and business continuity to mitigate data security challenges
"From a long-term sustainable point of view, organisations will need to adopt data minimisation and privacy by design and default."More
Story image
The current state of ransomware — and its future
Discoveries made by analysts at Sophos have unearthed a new development: ransomware code appears to have been shared across ‘families’, and some of the ransomware groups seemed to work in collaboration more than in competition with one another. More
Story image
Cyberattacks on healthcare organisations "out of control" - Check Point
There has been a 45% increase in cyberattacks on healthcare organisations worldwide in the last two months, making healthcare the most targeted industry by cyber criminals.More
Story image
SASE vs zero trust – or the best of both worlds
Zero trust and SASE work together by converging a least-privilege access strategy with an architecture that simplifies how highly distributed users, BYOD, and cloud resources are secured.More
Story image
Demystifying 'zero trust' and its role in cybersecurity
The principle of ‘zero trust’ in cybersecurity is simple: Trust nothing, and verify everything.More