facebook linkedin twitter

Computerware Blog

There’s a Right Way to Work Remotely, and a Not-So-Right Way

There’s a Right Way to Work Remotely, and a Not-So-Right Way

Under the current circumstances, remote work is being viewed as the safer option. This has led a lot of businesses to adopt these practices for the time being--you may have already done so. However, some employees have a better grasp of how to properly work from home than others. We’ve put together a few examples of how an employee may conduct themselves while working from home.

Look at these scenarios to see if you can spot some of the biggest issues with how some people may approach the idea of remote work.

Scenarios

The Morning Routine

  • Frank wakes up at his usual time, and (other than indulging in a little extra time in the shower) follows his usual routine to get ready for work.
  • Joe sleeps in until the last minute, leaving barely enough time to shower before the day begins.

Frank has the better approach to his morning, as he is giving himself the chance to wake up and prepare for the day in a way that is more like what he is used to.

Breakfast

  • Veronica prepares a healthy and balanced breakfast to start her day.
  • Betty skips breakfast, except for a cup of coffee.

A healthy breakfast is generally the best way to begin the workday, as it provides the brain and body with much-needed energy to make it through the day. It also prevents any distraction caused by hunger pangs.

Attire

  • Clyde throws on a pair of old sweatpants.
  • Bonnie dresses as she would on a casual Friday in the office.

By following the “dress for the job you want” philosophy, Bonnie is mentally priming herself to accomplish more throughout her day. Clyde, while comfy, is dressing as though it is his day off and potentially putting himself in the wrong frame of mind.

Workspace

  • Joey works wherever he feels most comfortable, sometimes plopping into his favorite recliner, and sometimes lounging around on his bed.
  • Phoebe has a dedicated corner set aside from her main living space where she does her work.

Phoebe is taking steps to prevent herself from relaxing too much during the workday. By allowing himself to get too comfortable, Joey runs the risk of drifting off and even falling asleep.

First Steps

  • Paul starts off his day by accessing his social media accounts and watching silly videos before he begins working.
  • When it is time to start the day, John has his tasks laid out and ready to go and is already communicating with his coworkers.

By acting proactively, John can get ahead and start his day off on the right foot, enabling him to work collaboratively with his coworkers more effectively. On the other hand, Paul is already putting himself in a poor mindset which could influence his work ethic for the rest of the day.

Priorities

  • Stan finds himself making excuses to wander away from his work all day, even cleaning up his home and doing laundry when he should be in his seat. As he works, he does so in front of the television.
  • Oliver focuses on his work throughout the day, not allowing the temptation to procrastinate to overcome him. He plays a quiet instrumental in the background to break the silence.

While it can be tough to remain focused in an unsupervised environment with so many distractions so regularly available, it is important to do so. By dealing with other, non-work-related priorities and subjecting himself to distractions, Stan is potentially impacting the rest of the team’s ability to do their work as well.

Lunch Choices

  • When it is time for her to take her lunch, Lucille takes advantage of her kitchen and prepares herself a light and healthy meal.
  • Desi takes a midday meal of leftover chicken wings and fries that he found in his refrigerator.

By filling himself with grease in the middle of the day, Desi is preempting himself to feel bloated and sluggish throughout the afternoon. By taking the time to prepare herself a proper meal, Lucille is giving herself the clean energy needed to think and perform her best.

Downtime and Dinner

  • When the end of the day comes, Amy winds down and entertains herself with a hobby. She works on a jigsaw puzzle, before stepping away and making a balanced, tasty meal.
  • Tina got a late start to her day, so she ends up working later than her coworkers. When she finishes her day, she orders in takeout for delivery.

Again, we come across an example of put good in, get good out. Make sure that you start off your day on the right foot and nourish yourself appropriately so that you can work productively and finish your responsibilities when you should.

Bedtime Routine

  • Fred spends hours online, clicking on silly things and accomplishing very little. He eventually drags himself to bed late at night and plops down, but even though he feels drained, he has a hard time falling asleep.
  • When her usual time for bed comes, Ginger gets up and prepares herself for the night. Once settled in, she promptly drops off to sleep with plenty of time to rest before morning.

Getting enough rest is a crucial part of the next day, as without it, your abilities are going to diminish. By stimulating his mind late into the evening, Fred is not only depriving himself of sleep, he is prolonging the time before he will be able to rest properly.

What We Can Take Away

In order to work effectively, whether at home or in the office, we first must work to take care of ourselves. While we may not all face the same choices as the ones found in these examples, most everyone can find it challenging to differentiate between their work time and their personal time while they are at home.

However, doing so isn’t impossible, so long as you and your team go about the day mindfully. Have your team read this over to help make them aware of how their choices accumulate over the day.

If you need help with supporting a remote workforce through the right IT solutions, Computerware has the solutions and services you need. Learn more by giving us a call at (703) 821-8200.

What Makes VoIP So Different?
Tip of the Week: Phishing Training Has to Be a Pri...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, September 28, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Software Cloud Data Business Management Hackers Hardware Microsoft Workplace Tips Network Security Backup Productivity Managed Service Provider Hosted Solutions Business Email Productivity Malware IT Services Efficiency Saving Money Google Innovation Small Business Computer User Tips Collaboration Quick Tips VoIP Data Backup IT Support IT Support Smartphones Network Business Continuity Mobile Devices communications Disaster Recovery Data Recovery Gadgets Microsoft Office Android Cybersecurity Social Media Smartphone Upgrade Mobile Office Server Communication Phishing Virtualization Miscellaneous Mobile Device Management Ransomware Mobile Device Vendor Management Operating System Passwords Windows Users Holiday BDR Apps Tech Term Managed IT Services Windows 10 Outsourced IT Remote Monitoring Unified Threat Management Facebook Internet of Things Automation BYOD Mobile Computing Managed IT services Remote Computing Apple Data Management Analytics Windows 10 WiFi History Training The Internet of Things Browser Marketing Cloud Computing Artificial Intelligence Business Technology Firewall Save Money Big data Encryption Spam App Help Desk Alert Health IT Consultant Two-factor Authentication Managed Service Information Technology Bandwidth Office Office 365 Covid-19 Budget Windows 7 Gmail Blockchain Government Content Filtering Cybercrime Hard Drives Going Green Maintenance Printer VPN Bring Your Own Device Access Control Antivirus Managed IT Search Healthcare Outlook Recovery Networking Windows 8 Hiring/Firing Employer-Employee Relationship Lithium-ion Battery Retail Best Practice Saving Time Cost Management Computers Tech Support Virus Remote Work Wi-Fi Wireless Technology Information Phone System Data Security Customer Service It Management Data Loss iPhone Money Document Management Conferencing Project Management Humor IBM Computing Hacking Augmented Reality Travel Education Update Risk Management Data storage Current Events Flexibility Wireless Patch Management File Sharing Avoiding Downtime Laptop Save Time Downtime Hard Drive Storage Website Legal Applications Mobility Regulations Data Breach Voice over Internet Protocol Computer Repair Running Cable Proactive IT Value Password SaaS Customer Relationship Management Hacker PowerPoint Twitter Intranet Law Enforcement Vendor Solid State Drive Administration Compliance Vulnerabilities Virtual Desktop Social Black Market Net Neutrality Cryptocurrency Business Intelligence Chrome Digital Payment DDoS Business Growth Router Scam Google Maps Comparison Tablet Fax Server Social Engineering Word Company Culture Excel Paperless Office Cortana Social Networking Digital Sports Meetings Disaster Websites Monitoring Hosted Solution Private Cloud End of Support Employee/Employer Relationship Robot Telephony Securty Software as a Service Management Machine Learning Cooperation User Telephone Systems Bitcoin Bluetooth Processor Specifications Safety Data Protection Public Cloud Licensing Documents User Error Co-managed IT Solutions Inbound Marketing Memory Teamwork Heating/Cooling Smart Devices Downloads Google Docs Identity Theft Entertainment Notifications Employees Experience Professional Services Cleaning Video Conferencing Monitors Computer Accessories Redundancy Integration Lifestyle Politics Pain Points Office Tips Virtual Reality Distribution Trending Emails Automobile Chromebook eWaste Evernote YouTube Mouse Virtual Assistant Unified Communications Settings Managed Services Provider Computing Infrastructure Cost Hack Statistics Programming How To Download Start Menu Tech Terms Network Congestion How To Processors Mobile Technology Managed Services Gaming Console IT service USB Managed IT Service Microchip Taxes Uninterrupted Power Supply Webcam Streaming Media Multi-factor Authentication Presentation Text Messaging Vulnerability Telephone Distributed Denial of Service Microsoft 365 LiFi Network Management Employer Employee Relationship IT Electricity Printing Managing Costs Read Equifax Fleet Tracking G Suite Remote Workers Hacks Physical Security Browsers Thin CLient Device security MSP Virtual Private Network Medical IT Trend Micro 3D Ebay Banking Social Network Botnet FinTech User Tip Proactive Maintenance Smart Phones Work/Life Balance Desktop Finance Relocation Tablets Digital Signature Development cache Security Cameras Television Threats Deep Learning Device Management Nanotechnology Visible Light Communication Business Managemenet Business Cards Service Level Agreement WannaCry Navigation Virtual Machine Content Management Webinar Startup Asset Tracking Sync Data Storage Unified Threat Management Backup and Disaster Recovery CCTV Corporate Profile Data Analysis Leadership Username Procurement Time Management Freedom of Information eCommerce Adminstration Pirating Information IT consulting Screen Reader Business Metrics Customer Resource management Computer Malfunction PDF Organization Printers SQL Server Gamification Reliable Computing Assessment GDPR SharePoint Managing Risk online Currency Tip of the week Advertising Flash Piracy Upload Best Available Keyboard Communitications Tech Google Calendar Hypervisor CIO Smart Tech In Internet of Things PCI DSS LinkedIn Fiber-Optic Database VoIP Fileless Malware Hybrid Cloud Staffing Google Wallet HTML Domains Supply Chain Management Touchscreen News Holidays Windows XP Telephone System Motion Sickness AI Proxy Server Knowledge Azure Society Best Practives Mobile Security Scalability Public Speaking Internet Service Provider Consultation Modem Strategy Displays Regulations Compliance Electronic Medical Records Transportation Skype Software License Trends Messenger Tracking Shortcut IT Assessment Term Technology Tips Upselling Micrsooft Archive Multi-Factor Security Video Surveillance Microserver Fraud Tactics Rental Service Entrepreneur Directions Audit Display Drones Devices Troubleshooting Remote Working Recording Fake News Optimization Web Server Environment Supply Chains Dark Web Free Resource Saving ZTime Point of Contact UTM Content Cabling HIPAA SSID Data Warehousing Electronic Payment Financial Data Health IT Emergency Hard Drive Disposal Permissions Language Get More Done IT Plan Enterprise Resource Planning Books Workers Competition Electronic Health Records Access Processing Legislation Error Administrator Debate Turn Key email scam Addiction Supercomputer Memes Computer Care Wasting Time Harddrive Printer Server Accountants A.I. Business Owner Logistics Microsoft Excel Virtual Machines Bookmark Music Analytic Trojan Worker IP Address Managing IT Services Google Drive Windows Server 2008 Cyber security GPS switches Writing Recycling Human Resources Telework Employer/Employee Relationships External Harddrive Product Reviews Migration Connected Devices Reading Samsung Application Surveillance Spyware Google Play Mobile Payment Telephone Service Upgrades Organize Wireless Headphones Financial 3D Printing CrashOverride Managing Stress Capital Regulation Productuvuty Personal Information

toner1