Office Connectivity Considerations

When considering connectivity for an office, there are several important factors to consider. First and foremost, you need to consider the type of internet connection that will be used. This will likely be a broadband connection, such as cable or DSL, but it’s also possible to use a cellular connection or a satellite connection if necessary.

Next, you need to consider the type of network that will be used within the office. This could be a wired network, using ethernet cables to connect devices, or a wireless network, using Wi-Fi to connect devices. Each type of network has its own advantages and disadvantages, so it’s important to choose the one that best suits the needs of your office.

Another important factor to consider is the amount of bandwidth that will be required to support the needs of the office. This will depend on the number of users and the type of applications and services that will be used on the network. It’s important to choose a network and internet connection with sufficient bandwidth to support the needs of the office without causing slowdowns or other performance issues.

Finally, you need to consider security when planning the connectivity for your office. This includes both physical security, such as protecting the network hardware and cables, and digital security, such as using encryption and firewalls to protect against cyber threats. It’s important to implement appropriate security measures to protect your office’s network and data.


User/Device Scenarios

Each user might be a member of multiple organisations, using multiple services through multiple accounts on multiple platforms with multiple devices, each of which could have multiple users.

An example might be a user working for more than one client, using both Microsoft 365 and Google Workspace for different situations, having more than one account in each service to provide for different needs, and using both windows and apple devices, so requiring multiple Apple, Microsoft and Google accounts, and some or all of the computers or mobile devices might be shared with other users.

There is no unified solution to manage this scenario, so the user should be assisted and enabled to manage their own devices.

Technical Support and IT Administration depends on the particular needs of the organisation and of the users.

Centralised management of users and devices is not necessarily appropriate for smaller organisations, although it would be best if all users were committed to using 2FA/MFA and disk encryption, for security.

Centralised IT management starts to correspond to the constraints of organisations of 100 or more users, at which point the user is probably a member of that single organisation which will dictate the way the user works.

At a smaller level, IT Support can be more individualised and personalised.