A new IT study has found that the increasing demand for flexible working prompts businesses towards the adoption of new mobile technologies such as cloud and mobile computing.
Carried out by Stem Group and Plymouth University in the UK, the South West Business IT Survey 2012 reveals that demand from employees for flexibility on how and where they choose to work has led to many companies now looking into new technologies.
Of the companies surveyed, 80 per cent said that they supply staff with laptops and 70 per cent provide mobile phones to employees.
The survey found that while IT budgets still only account for one to five per cent of a business' budget, companies are moving in a "positive direction" and prioritising improvements in productivity and business processes.
"The survey has identified some very interesting results, particularly the moving priority towards cloud technology and enabling employees to use their own devices," Stem Group managing director Stephen Tyrrell said in an April 8 statement.
The survey also revealed that staff having the ability to work from anywhere has "cut down dramatically" on issues like lost days due to illness and bad weather, and problems around no transport or child care.
These results come on the heels of an Australian study commissioned by accounting software provider MYOB, which found that almost three in five Australian small and medium-sized businesses now have employees who telework to some extent.
According to that survey, one in four (25 per cent) of the 1,005 SMEs surveyed said their employees worked 'mainly away from the office', and one in three (32 per cent) said they worked 'partly from home and from the office'.
This news highlights the importance for businesses of having a robust security policy in place, in order to minimise the risk of a data breach occurring even when employees are working in and out of the office.
Undertaking a vulnerability management program with the help of a trusted security solutions provider can ensure that any flaws in your system can be identified before they are exploited by cybercriminals.
Penetration testing and ethical hacking are two measures that may be used to help resolve any security issues in your company's ICT system, finding any security weaknesses that may be apparent before they can be used against your company.
Dealing with the fallout of a security or data breach can be both costly and harmful for the reputation of any company, which is why undertaking a regular security audit is so important.