Guest Post: Collaboration

The mobility of employees wouldn’t be possible without collaborative tools allowing those employees to connect with coworkers anywhere, anytime. This of course means that collaboration has been a hot topic these days – organizations are promoting it, executives are fostering it, and individuals are utilizing tools to collaborate both professionally and personally.

For example, IBM has been focused on effective collaboration for many years now, even before the advent of Facebook and LinkedIn (if you can imagine).  It started with a “profile” for every employee, complete with a picture, contact information, skills, interests, and recent assignments. From there, it grew to include sharing files, favorite bookmarks, blogs, wikis, and activity management.  Each person’s entries are linked back to that person, so you can follow or keep current on what any of your colleagues are working on.

Tools like this have allowed our organization to become interconnected – perhaps even smarter, by leveraging experts in each field to create a better solution. There are many tools out there that organizations can use to foster a collaborative environment among their employees. But providing the tool is only the first step, you also have to create the environment and for that I’d like to share a few suggestions for enhancing and promoting collaboration in your organization and your network:

1.  Build trust.  Collaboration is built on relationships, and relationships are built on trust.  Get to know someone new or take an acquaintance to coffee. Don’t skip out on relationship building just because that relationship may be virtual.

2. Reach out to others for additional perspective.  You might be surprised about the talents and interests of some of your colleagues.  Learn what people are passionate about and engage their skills in those areas. Ask for advice – people have so many hidden talents. Those talents, the ones that you wouldn’t know about from their day to day work, in addition to their job skills, may prove to be very helpful to something you are working on.

3. Offer to help.  If someone is working on something that interests you, ask to help or be involved.  Most people would welcome the help, and you can build trust and generate more ideas. When the time comes and you need assistance, that person will be much more likely to help you.

So while collaborative tools have launched a mobile workforce, they are truly only one small part of the big collaboration picture. Just as office dynamics hinge on the quality of relationships of the individuals within it, collaborative networks and their results are also dependent on the trust and cooperation of its members. So get out there and get connected!

This post was written by: Martha Gibson, IBM Senior Managing Consultant


Mobility & Security

As I mentioned in a previous post, although there are many organizational benefits to mobile technology, there are also risks. It is nearly impossible to read the newspaper (on paper or online) and not stumble across an article about data security. Organizations continue to grapple with not only an increase in the quantity of cyber attacks, but also an increase in the sophistication, as was pointed out in this recent post on DefenseSystems. When we think about the risks associated with data privacy, directed attacks are only on piece of the pie, there are also data leaks. Data leaks can result from even the best intentioned of employees if they aren’t aware of the risks.  Leaders of organizations with mobile people and mobile devices need to put in place plans to protect themselves from these risks.

Mobile People

Now as the office walls come down and telecommuting goes up, we find more of our employees working from here, there and everywhere.  Increased flexibility, productivity and cost efficiency are proving why a mobile workforce can be a good thing. No longer tethered to their desktops, employees can better serve clients and balance their personal needs. But when you have an employee working from an airport, a coffee shop or a hotel restaurant, you increase the likelihood that they are not the only ones checking out their work. We assume everyone around us is a stranger, with no interest in our work, but that’s not always true. Calls can be listened to, documents can be read (over shoulders no less over unsecured networks) – and all of this can be done simply because employees are not in the office.

Does this mean we should force all of our employees to work from the office or be constantly looking at those around us with suspicion? No. We need to be aware of the reality, not so we can sink in paranoia, but so that we can prepare.  For example, these simple tactics from Ehow such as privacy screens can deter peering eyes.

Mobile Devices

And mobile people are truly only mobilized because of mobile devices – smaller, more efficient technology that laughs at the days when cell phones were bricks with antennas and computers barely fit in rooms, nevermind cubicles. While organizations may have more control over their issued laptops and phones, personal devices are open season to data hunters. Unsecured connections and applications, along with the relative ease of nabbing someone’s cell phone are good enough reasons that we should be thinking about protecting our data.  While technical filters, such as data encryption and password protection are important, leaders need to take it a step further and institute data and device policies.

In addition to those filters, organizations should establish “a use-policy for mobile devices that takes advantage of their built-in security features and adds to those the best practices recommended by data security professionals.  Examples include enabling “remote wipe” capabilities, so users can remove all data from lost devices; using strong passwords and changing them regularly; and installing and updating anti-spyware applications” said Gadi Ben Yehuda of the Center for the Business of Government in his recent blog post, Smart Policies for Smart Phones.

“Education is the most powerful weapon”*

As Gadi concluded in his blog post, so will I: Education is the most important thing your organization can do. Educate your employees on the real risks associated with mobile technology. Chances are your employees aren’t aware of the fact that data that can be taken off of their smart phones from applications or how little information is needed to piece together a complete story with Snapshot technology. Let your employees know how they can protect both their personal data and the organization’s, starting with simple changes like password protecting their phones. And don’t forget to mention the point of it all, when data is leaked, the risk isn’t simply to numbers and products, but to real people and their personal information, something we should all be invested in protecting.

*A portion of a quote by Nelson Mandela