sb-nz logo
Story image

How to support a remote workforce without losing your mind

Distance makes the heart grow fonder, and apparently, is no longer an obstacle for team productivity.

Thanks to new work habits and rapidly evolving technology, virtual teams are now taking the workplace by storm where technology serves as
 the only connection between users and the rest of the business.

However, successfully supporting virtual teams demands a comprehensive approach. Lenovo’s ‘How To Guide’ can help you and your company find ways to get there.

The right strategy requires a proactive approach and a focused team with connected users. Your number one goal should be to proactively confront the challenge.  

  • Before purchasing devices, train your users
  • When purchasing devices, look for reliability first
  • After purchasing devices, make sure they are well-maintained and managed  
Story image
Why zero trust could fail due to lack of understanding​, not technology
Security architects are being forced to re-examine the concept of identity, with many turning to a zero trust security model to provide a better architecture for protecting their sensitive resources.More
Story image
Google Cloud observes spike in DDoS volumes in last two years
Google Cloud has seen an ‘exponential’ rise in distributed denial of service (DDoS) attacks over the past decade, but the biggest attacks have only occurred in the past couple of years.More
Story image
Acronis expands global data centre network, including new facilities in NZ
The expansion ensures that the full range of Acronis Cyber Protection Solutions will be available to partners and organisations around the world.More
Story image
Citrix adds zero trust to workplace security programme
Companies can evaluate their current security strategies and leverage existing investments to design and implement a Zero Trust framework.More
Story image
Cisco report: Remote working is here to stay, making cybersecurity a top priority
"With this new way of working here to stay and organisations looking to increase their investment in cybersecurity, there’s a unique opportunity to transform the way we approach security as an industry to better meet the needs of our customers and end-users.”More
Story image
The three-pronged security approach that confronts security breaches head-on
Having these three processes working in tandem is key to cushioning the blow of a breach - which, if insufficiently protected, can take on average 279 days to contain and costs an average of almost US$4 million.More