The socially distanced office

ramsac socialy distanced office

In this short video, we discuss the IT and safety recommendations that organisations should consider for making a return to the office following the coronavirus pandemic. It’s time to think about the tech in your meeting rooms, how your communal areas will change and the systems you will need to introduce to make working easier for your staff while remaining safe and following social distancing rules.

Take a look at our most recent blog for a more detailed explanation on Social Distancing in offices – IT considerations for safely reopening

Related Posts

  • How to simplify IT budgeting and modernise tech with Windows 11

    How to simplify IT budgeting and modernise tech with Windows 11

    IT

    Learn how a 3-year IT refresh plan and Windows 11 upgrade can help your business stay secure, efficient, and financially agile. [...]

    Read article

  • Achieving ISO 27001 Certification: Advancing Information Security Excellence

    Achieving ISO 27001 Certification: Advancing Information Security Excellence

    ITTechnical Blog

    Discover how we achieved ISO 27001 certification, the challenges we faced, and the lessons we learned, plus how we can support your journey to stronger information security. [...]

    Read article

  • The hidden cost of technical debt: Why your organisation can’t afford to ignore it

    The hidden cost of technical debt: Why your organisation can’t afford to ignore it

    IT

    Technical debt can silently undermine your business, increasing costs and security risks while limiting innovation. Learn what it is, how it affects your operations, and how to manage it [...]

    Read article

  • Windows 10 End of Life: What It means and why you need to act now 

    Windows 10 End of Life: What It means and why you need to act now 

    IT

    With 8 months until Windows 10's End of Life, organisations must act quickly to avoid risks and disruptions. Learn how ramsac can ensure a smooth transition. [...]

    Read article

  • What is Shadow IT? – Exploring the risks and opportunities

    What is Shadow IT? – Exploring the risks and opportunities

    ITTechnical Blog

    This blog explores the risks of unauthorised IT use, from security vulnerabilities to compliance breaches, while also highlighting how organisations can leverage it to uncover unmet needs, drive innovation, [...]

    Read article

  • 6 steps to designing an Identity Access Management strategy

    6 steps to designing an Identity Access Management strategy

    IT

    An IAM strategy is a powerful mechanism for controlling and monitoring access to your company’s IT network and assets, ensuring robust protection against cyber threats. [...]

    Read article

Quiz yourself

Are you more cyber savvy than an 11 year old?

11-14 year olds get asked these questions in school. Could you get these right?