Covid-19 Home Working

Fox Technologies can provide the technology to protect your employees during the Covid-19 outbreak by having them work safely from their homes.

Employee remote working through the Covid-19 outbreak

Due to the unprecedented restrictions and challenges facing employers and employees through the recent Covid-19 outbreak, companies have been forced to re-evaluate their business and IT infrastructure model.

Fox Technologies have empowered its clients and their employees to work from home effectively, to minimise the disruption experienced by their business and to their clients.  

Most of our client base in Leeds and the surrounding West Yorkshire area were facing the same issues as many companies around the world with the onset of the Covid-19 outbreak.  They had all invested capital and time in creating office-based IT environments that worked precisely and effectively to service their business needs.  Suddenly with the onset of the Covid-19 threat, they required remote home users to take advantage of this technology from remote locations around the Leeds and Yorkshire region quickly with little to no time to plan. We used our knowledge and the Microsoft range of products and services to achieve their needs. They received priority service from our support team as they were already monthly retained customers. As such together we were able to achieve eighty five percent of their requirements within a one-week period. This provided them with a distinct advantage over their rivals.

We achieved this by employing Microsoft’s Remote Desktop Services combined with their Microsoft Office 365 suite and Teams cloud collaboration solution.

Microsoft Teams  

Microsoft Teams provides a modern conversation experience for today’s teams. Microsoft Teams supports not only persistent but also threaded chats to keep everyone engaged. Team conversations are, by default, visible to the entire team, but there is of course the ability for private discussions. Skype is deeply integrated, so teams can participate in voice and video conferences. And everyone can add personality to their digital workspace with emojis, stickers, GIFs and custom memes to make it their own.   Microsoft Teams brings together the full breadth and depth of Office 365 to provide a true hub for teamwork. Word, Excel, PowerPoint, SharePoint, OneNote, Planner, Power BI and Delve are all built into Microsoft Teams so people have all the information and tools they need at their fingertips. Microsoft Teams also shares the same Connector model as Exchange, providing notifications and updates from third-party services like Twitter or GitHub.

Microsoft Remote Desktop Services (RDS)  

Microsoft Remote Desktop Services (RDS), once known as Terminal Services, is the system of virtualization and service management solutions for companies with complex organizations and data needs. While there are other options out there for virtualization, there are plenty of advantages to head over to Microsoft’s own solutions first. If you haven’t considered any type of remote desktop services before, now is an excellent time to explore the virtualization services provided. Virtualization has many on and off-site benefits, but it has grown as a popular and effective solution to security risks in the last couple years. This is especially true in BYOD and other mobile environments where companies are almost powerless to control employee behaviour or mobile OS vulnerabilities like Zero Day that keep on appearing. It’s too dangerous for companies to house sensitive data directly on mobile devices. Fortunately, Microsoft has included necessary security management options in RDS to help create virtual desktops and other virtual connections that keep data more safely organized on servers rather than spread out on mobile devices.

ESET DESLock+ Server Controlled Encryption Service  

ESET Endpoint Encryption Server includes several encryption solutions that can be distributed to client workstations using the DESLock+ Enterprise Server Console. Centrally managed clients ensures that equipment is secure at all times, with the option to remotely disable any item at any time rendering it useless to the person who is in possession of it at the time.  Even if the disk is removed from the device it cannot be accessed without the encryption password or recovery key.

Cyber Crime Statistics 

Get Protected Today


Is the average monetary cost of a ransomware attack on businesses


% of malware is delivered by email


% of malicious email attachments are office files


% of businesses experienced denial of service attacks in 2018



Request a Call Back.

Call Now ButtonCall Now

We use cookies to give you the best online experience. By agreeing you accept the use of cookies in accordance with our privacy policy.