January 13, 2017 By David Strom 2 min read

The concept of hot desking — the practice of working in a shared office with unassigned desks — has been around for at least a decade. While much has been written about it from a worker’s point of view, employers and IT administrators have had a relatively small voice in the discussion around the latest office craze.

Before you even consider whether this type of model fits your operational structure, it’s important to review the networking and computing infrastructure required for hot desking.

Challenges of a Fluid Workspace

First, consider how long a particular employee needs a place to work. A few programs are designed for all-day tenancy, while others operate in shorter bursts. Some programs also have meeting rooms that can be reserved in advance so that conversations don’t interfere with the work environment.

Next, choose a standard collection of communication tools, including conference calling software, an instant messaging program and phone services. The challenge here is to make use of a single software standard for each so that every employee is able to connect with everyone else. Products such as Skype for Business and Slack offer multiple communication protocols.

Define Your Hot Desking Strategy

While most people now use their mobile devices as their main business phones, some organizations provide what is called a “follow me” service on their office private branch exchange (PBX). This feature enables employees to forward a phone number to a particular landline extension or cellular number.

The next step is to define your desktop strategy and decide whether you need a bring-your-own-device (BYOD) or virtual desktop infrastructure (VDI) solution. Some hot desking programs support corporate-owned laptops, for example, while others allow employees to bring their own or require them to use virtual desktop workstations.

If you go the VDI route, be sure to provide persistent workstations. This will preserve the state of the desktop so employees can pick up where they left off upon logging back in. If you decide against VDI, leverage a tool such as roaming user profiles to automate user desktop setup.

Fighting for Window Seats

Hot desking creates challenges when it comes to printing, copying and scanning, since these tasks can be difficult if employees are moving from place to place every day. Some printers include special software that holds a document and will only print when a user enters a PIN code or otherwise authenticates the command. This helps ensure that unauthorized parties cannot access sensitive information from these office devices.

Finally, it’s important to ensure that each desk and piece of office equipment is equal to simplify setup time, minimize conflict and maximize productivity. Tales of window desks being “reserved” for managers increases tension within a shared office and sends the wrong message about hot desking.

More from Endpoint

Unified endpoint management for purpose-based devices

4 min read - As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized tablets and smartphones, handheld scanners and kiosks. Many different industries are utilizing purpose-built devices, including travel and transportation, retail, warehouse and distribution, manufacturing (including automotive)…

Virtual credit card fraud: An old scam reinvented

3 min read - In today's rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This delicate balance between new offerings and security controls is a key part of the modern banking challenges. In this blog, we explore such an example.…

Endpoint security in the cloud: What you need to know

9 min read - Cloud security is a buzzword in the world of technology these days — but not without good reason. Endpoint security is now one of the major concerns for businesses across the world. With ever-increasing incidents of data thefts and security breaches, it has become essential for companies to use efficient endpoint security for all their endpoints to prevent any loss of data. Security breaches can lead to billions of dollars worth of loss, not to mention the negative press in…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today