We had the opportunity to attend to the the Legislative Committee meeting hosted by the Naperville Area Chamber of Commerce and the topic was "US Department of Labor Overtime Changes"
The Rahje Woodward Law Office presented key interesting data about the final rule:
All above simply translates for the employer into new strong obligations in favor of employees that suddenly are entitled to get paid for overtime; this situation will force employees to opt for options like
From the legal and labor prospective, employers are urged to take action by
While the laws are intrinsically issued in lieu of better work conditions (which we welcome), if left unattended could pose serious burden to employers and companies and ultimately affect any work environment negatively.
So how can iEple help businesses embrace the new laws and use them as an opportunity to reassess the company, maintain (or even improve) profitability without affecting employee engagement? Here are iEple's 3 bullets of tech support:
2. Control "Off the clock" activities:
2.1 Implement automated reports based on employee computer usage: Affordable enterprise reporting solutions can read Active Directory logs and translate them into easy to read automatic reports you can review every week; investing 2 minutes a week you could spot behaviors that could be affecting productivity or generating unnecessary overtime. Your employees will not feel like being micromanaged as reporting occurs privately.
2.2 Assessment and implementation of group policies to prevent or track employee access to company data or email after hours.
3. Centralize off the clock data access with implementation of terminal services or virtual desktop environments when remote or "off the clock" work is strictly required, it is recommendable to have mechanisms that will help employees be more efficient and accurate with their time despite not physically being under management radar. A company managed remotely accessible desktop environment can help employees perform more efficiently and employers have peace of mind company data is safe and company policies fulfilled in an effective way.
Talk to an iEple representative and discover more technologies that can help you take the reins of your business and overcome new challenges from regulations while also empowering your employees with the right tools to perform their work and enjoy what they do.
Phishing is the most effective way hackers have nowadays to seed viruses and malware to corporate networks for the following reasons:
Can we avoid phishing emails?
In theory yes; spam filters are constantly looking for signs of phishing at the binary and heuristic level, however a good percentage of messages can still go through.
Another risk is the ability for users to review their spam folder; then phishing messages that may look "legit" can lead us to think it was sent to spam by mistake.
So here are our quick 4 things you and your employees should be trained to watch on every single email that comes across:
1. ALWAYS check full details of the sender:
The example above shows "Paypal" on the list of senders; just click on the details of the sender to reveal the real email address. In the example you can see it's not coming from Paypal at all.
2. DONT CLICK ON LINKS before you verify them:
If you are prompted to click on a link to "Verify" or "login" STOP and check that link. Simply hover the mouse on the text or button to reveal where they are trying to take you. In the example above notice how the link would take you to "service-infos.com" which is completely unrelated to Paypal.
3. DO SOME READING
Spammers take advantage of our global inability to pay attention to detail; we unconsciously validate information when we look familiar logos.
Honor your junior high grammar teacher's dream and notice language that you wouldn't expect from a professional. See the example above and watch for simple mistakes that simple don't look good with the context.
4. MIND ATTACHMENTS, scan them first
We receive attachments every day and technology give us the comfort to open them right from our email client or webmail page. Before opening the attachment ask yourself:
The most common attachment extensions are
The most common file extensions used for malicious software sent by email are:
Whether is a common file and coming from a trusted sender, always download the file, rather than opening them; then right click on it and select the option to scan with your default antivirus.
Again, any company should have a solution in place for Spam filtering and threat detection. If you don't it is time to get one. Call us to find out how easy is to implement and the many benefits your company will gain.
Thanks for staying with us so far, we hope this information is valuable. If you'd like to learn more about security for your business computers, managed antivirus and other ways we can help to prevent threats on your network, please contact us and we'll be ready to assist and provide guidance.
Deploy dozens of computers in minutes with iEple's BioGreenPC
Enterprise I.T. Support for ALL