Get Started Today!  (415) 295-4898

croom new

415 IT Blog

How to (And How Not to) Approach Remote Work

How to (And How Not to) Approach Remote Work

Many businesses are currently finding the best course of action for them to take right now for the good of their employees is to adopt remote work policies. However, this puts a lot of responsibility on the employees to conduct themselves appropriately and spend the time they should be working diligently.

Let’s compare two hypothetical employees throughout their day to show how your team should--and most certainly should not--go about working remotely.


Amy wakes as her alarm clock rings at the same time it would any other workday. She gets up and goes about her morning routine, which now includes a little bit longer time taking care of her dog. When the time comes to log in, she is showered and ready to start the day with a healthy breakfast energizing her.

Meanwhile, over at his apartment, Jeff hits the snooze button a few times before finally jolting up to look at the clock. Seeing that work is about to start, he shuffles into the kitchen in his pajama pants and t-shirt to pour himself a cup of coffee before settling in to work.

Start of Day

At the scheduled time, Amy’s workstation is booted up and she has successfully signed into the solutions she needs to start the workday. Seated in a small corner of her apartment that she has set aside for the purposes of remote work; she gets down to accomplishing everything on her schedule. She starts by reviewing that schedule one more time and making note of who she will be working with on her various activities throughout the day. Using the company’s messaging app, she checks in with her department to briefly go over what each of them are responsible for.

Jeff is still in his pajamas, sprawled out on his couch with his laptop. He has all his important work to do that day opened on his display, but before he does any of it, he checks his social media and gets wrapped up watching a video that someone posted on his profile. Figuring he can start work whenever and just keep going until he’s done, Jeff gets back up and heads back into the kitchen for something real to eat. Once he’s done, he starts cleaning up after himself and without realizing it, finds himself idly tidying up his whole place.


As lunchtime rolls around, Amy stands up from her nook and stretches. Her few morning breaks primarily consisted of taking care of her dog’s bathroom needs, so she’s ready for a break after a morning full of accomplishment. She prepares herself a healthy lunch, entertains her fuzzy companion, and is ready to resume the day once her lunchtime is over.

Meanwhile, Jeff finally got down to business in the late morning and has done some good work in the time he’s been at his desk. Going into his fridge to find himself something to have for lunch himself, he sees the leftover takeout he had delivered the night before. He turns on a series he’s been watching as he works his way through the rest of his kung pao. When he finishes his meal, he puts his dishes in the sink and slumps back into the couch. Yawning, he opens his laptop back up while starting the next episode.

End of Day

Amy, having accomplished all she needed to, closes her laptop and steps away from her desk. Taking a few moments to go over what she got done and mentally review her performance, she calls her parents to check in on them, and gets out the hobby she’s taken up since keeping to her home: knitting (or learning how to, at least). A couple dropped stitches later, and the time comes for Amy to put down her needles, make herself dinner, and feed her dog.

Jeff continues working to the end of his day as well, accomplishing a sizable chunk of his scheduled tasks. However, since he got a late start, he finds himself working much later into the day than he would have otherwise… and, since the rest of the team has since signed off for the day, Jeff has important questions that nobody is available to answer. He finally calls it quits much later, drained.


When the time for bed comes, Amy puts down the book she’s been working her way through and gets herself ready to turn in. One last bathroom trip for the dog later, and she’s climbing into bed, relaxed and ready for rest. She’s careful to have gone to bed early enough to get a good night’s sleep before morning.

Late at night, Jeff pulls off his headset and turns off the latest game he’s downloaded to head to bed himself. Flopping under the covers, Jeff tosses and turns for a while, head full of the bright lights and sounds of the game, stomach still a little unsettled from the sweetness of the leftover chicken. It takes him a little while to fall asleep.

Looking back over how each of our example employees spent their day at home, it should be apparent who has a grasp over the accepted best practices of remote work. One should treat working from home just like working in the office, with the same schedule to keep and the same level of responsibility for accomplishing their given tasks on time. There are assorted behaviors that can make this a lot easier to do:

  • Keep regular bedtime hours to ensure you are well rested each day.
  • Nourish yourself with healthy meals and regular self-care.
  • Segment your life by distinguishing your workspace from your living space as much as you can.
  • Stick to your usual work hours to keep yourself on task.
  • Minimize distractions, like TV or even chores.
  • Take up a hobby to cleanly split work hours from personal time.
  • Don’t overwork yourself.
  • Stay in communication with your team.

Remember, the same temptations can influence everyone, so make sure to practice what you preach as you share these strategies with your team.

For assistance in facilitating the technical side of remote work, reach out to 415 IT today at (415) 295-4898.

How Managed IT Can Save You Money
Disaster Recovery Practices You Need to Implement


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, May 30 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Productivity Technology Best Practices Business Computing Data Backup Data IT Support Privacy Network Security Hosted Solutions Cloud Data Recovery IT Services Software Efficiency Internet Email Managed IT Services Malware Outsourced IT Business Innovation Small Business Tech Term Hackers Upgrade Cloud Computing Windows 10 Microsoft Computer Cybersecurity Business Management User Tips Collaboration Business Continuity Phishing Mobile Devices Google Hardware Communication Workplace Tips Managed Service VoIp Ransomware Managed Service Provider Smartphones Paperless Office Android Backup Office 365 Quick Tips Communications Encryption Server Mobile Device Disaster Recovery Remote Monitoring Data Management Managed IT Vulnerability Business Technology Holiday Internet of Things Windows 7 Passwords Wi-Fi Healthcare Network Browser Saving Money BDR Artificial Intelligence Help Desk Managed IT services Document Management Government Save Money Remote Work Applications Compliance Miscellaneous Laptops Social Media Facebook Smartphone Two-factor Authentication Redundancy Tip of the week Scam Vendor Management Bandwidth Virtualization Avoiding Downtime Automation Health Antivirus Processor Microsoft Office Users Information Blockchain Data Security Project Management Employer-Employee Relationship Data Loss Chrome Router OneDrive Maintenance Mobility Storage VPN Analytics Machine Learning IT Management Customer Relationship Management Website Access Control BYOD Virtual Private Network Windows Company Culture RMM Infrastructure IoT Software as a Service Proactive Meetings File Sharing Hard Drive Tablet Dark Web Augmented Reality Unified Threat Management Financial Remote Monitoring and Management Internet Exlporer Smart Technology Operating System Alert Managed Services Office Professional Services Training Computing Bring Your Own Device Electronic Health Records HIPAA Utility Computing Employees Consulting Downtime Server Management Social Network Employee-Employer Relationship Networking Covid-19 Flexibility Search Mobile Security Gadgets Managed Services Provider Unified Communications Assessment Remote Workers Password Files Apps Recycling Network Management Gmail Co-Managed IT The Internet of Things Consultation Cooperation Risk Management File Management Word Patch Management Time Management Net Neutrality Regulations Monitoring Payment Cards Management Mobile Computing Value of Managed Services Address WiFi Microsoft Excel Remote Worker Trending Mirgation PowerPoint Display Business Telephone OneNote Computing Infrastructure Permission Spam Teamwork Enterprise Content Management Information Technology Remote Working Features Statistics Wearable Technology Star Wars Cybercrime Cyber security Virtual Machines Authorization Biometric Servers App Options Telephone Google Calendar Fraud Politics Identity Theft Enterprise Resource Planning Return on Investment Techology Alerts Test Geography Private Cloud Cache IT Assessment How To Social Networking Shared resources Going Green Technology Laws Budget Virtual Reality Procurement Bluetooth Database Management Credit Cards Travel WPA3 Recovery Gamification Firewall Screen Reader 5G Mobile VoIP Emergency Multi-Factor Security Instant Messaging Identity Settings Personal Information Outlook Disaster Resistance Comparison Licensing Modem Manufacturing High-Speed Internet Vendor Printer Bookmarks ROI Remote Computing Virtual Assistant Bitcoin Digitize G Suite Batteries Unified Threat Management Data Warehousing Cyberattacks Social Tech Support GDPR Computers Technology Tips Fleet Tracking Zero-Day Threat Shortcut Proactive IT Mobile Office Distributed Denial of Service Mobile Device Management Websites Smart Tech Wireless Internet Big Data Windows Server 2008 Legislation Customer Service Transportation Mobile Active Directory Specifications Wireless Development Smart Devices Favorites Wasting Time Current Events Shadow IT Motherboard CIO applications Chromebook Read Only Operations Security Cameras IT Technicians Cost Management Lenovo Holidays Digital Payment Asset Tracking Hotspot Backup and Disaster Recovery IT Consulting Outsource IT Managed IT Service Point of Sale Tech Terms SaaS Connectivity Employer/Employee Relationships Apple Samsung MSP Finance Windows Server Outsourcing Black Friday Cookies Hard Disk Drives Cables Sensors SharePoint Conferencing Migration Database eWaste Vulnerabilities Mail Merge User Error Money Touchscreen Printing Hacking Notes Superfish IT Mouse Language Human Error Managing Stress User Management Data Breach Laptop Break Fix E-Commerce Theft Proactive Maintenance Solid State Drive Optimization Authentication Video Conferencing Cyber Monday Staff Electronic Medical Records Heating/Cooling Nanotechnology Solid State Drives Wires Downloads Permissions Chatbots Voice over Internet Protocol Projects Daniel Stevens Regulation Marketing Education CEO Printers Twitter Students

Latest Blog

While all a business’ technology solutions are important, some are bound to take priority over the others, especially when certain ones become an industry-wide focus. A recent survey evaluated the top concerns of small-to-medium-sized businesses for the coming year. The resu...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...