business focus
EXECUTIVE EDUCATION
OPEN PROGRAMMES BE EXCEPTIONAL. THE HENLEY WAY.
Work less and get more done
Leonardo da Vinci once observed that ‘The greatest geniuses sometimes accomplish more when they work less’
With ever-increasing commercial pressures, and distractions from technology, many of us feel like there are not enough hours in the day.
Are we addicted to being busy?
henley.ac.uk/open
Author Brigid Schulte suggests that a sense of ‘overwhelm’ can become a badge of honour. And as far back as 1970, Alvin Toffler predicted that accelerating technological change would result in humans exceeding the limit of our ability to process the information to make effective decisions.
But Graham Louden-Carter, who helps run the Henley Business School Leadership Programme, believes that by re-thinking our work patterns and developing personalised routines, we can achieve better balance and wellbeing, whilst becoming more effective and productive.
In his recent study of past theories, supported by evidence from Henley students, two recurring themes were the management of energy – physical, emotional, mental and spiritual – and creating rituals – for eating, exercise, preparing for meetings, rest, family time etc.
What can we do?
A number of theories encourage us to work in focused bursts of 45-minutes with 15-minute breaks, whilst telecom giants BT and Virgin – and many business
Graham Louden-Carter
leaders – share the view that we should:
• make time for enjoyment outside work
• • •
have email and phone-free periods each day, and after 8pm one night a week
share out-of-hours tasks involving customer service, emails etc across your team
have rigid guidelines about finishing times and daily downtime rituals.
Louden-Carter recalled his own experience with a recent Henley Leadership Programme participant who reassessed his life and consequently lost five stone, scheduled daily exercise and downtime, changed his approach to conflict, learned to prioritise and delegate and said no to some requests for his time.
In Louden-Carter’s conclusions, he urges us to recognise that we operate at our creative, productive best when we are focused, refreshed and energised. And we can take ownership of our time, by developing a plan that prevents unnecessary busyness and restores balance.
Read Louden-Carter’s full paper at
henley.ac.uk/leaders
Diana Richards 01491 418767
exec@henley.ac.uk @HenleyExecEd
32
businessmag.co.uk
Keep your mobile devices safe from hacking
In a world of increasing reliance on our smartphones and mobile devices for running a business, for example: storing client’s details, accessing work emails and booking appointments, there is also an increasing threat of a cyber-attack
A hacker can attack a smartphone or other mobile device without the owner’s knowledge and gain access to his or her messages, contacts, emails and even his or her location.
A case study
Louis was travelling for business and decided to use his work phone to browse the internet via an open network. While on the open network, Louis checked his work email and his personal bank account.
When Louis returned to his usual place of work the next day, many of his co-workers told him that they had received suspicious emails that appeared to come from Louis. In addition, Louis found that several strange charges had been made to his bank account. After an investigation, it was discovered that a hacker had used the open network to access Louis’ work contacts and bank account.
What can you do?
To protect the information on your devices, you need to know the main vulnerabilities that hackers can exploit to their advantage:
• Malicious apps: Many apps ask for more access to your device than is required. When you download an app, make sure to check how much access it has, and that the app has been made by a reputable developer.
In addition, always download an app from your device manufacturer’s official store. Apps downloaded from a
website or mobile link are much more likely to contain malicious code.
• Unsecured networks: Avoid using public networks when possible, and disconnect from a network immediately if your device prompts you with an unsecured network notification.
• Outdated operating systems (OSs): Frequently check your device for updates, and install them as soon as possible.
No one wants to be in the position of having to tell a client their data has been compromised so it is worth reviewing your approach to cyber security. You may also wish to consider whether you have the appropriate insurance protection in place to support you if you were to fall victim to cyber-crime.
If you would like a free review of your insurance call:
Simon Corderoy 07980 894917
Adam Jeffs 07748 647673
• Source Zywave: Safety Focused Newsletter September 2016
Jelf Insurance Brokers Ltd (Reg No. 0837227) is part of Jelf Group plc (Reg No. 2975376) and is authorised and regulated by the Financial Conduct Authority (FCA). Registered address: Hillside Court, Bowling Hill, Chipping Sodbury, Bristol BS37 6JX (Registered in England and Wales). Not all products and services offered are regulated by the FCA. JIB244.10.16
THE BUSINESS MAGAZINE – THAMES VALLEY – NOVEMBER 2016
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52