Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving the Oakland Park area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 3 Easy Exercises Designed for Office Workers

Tip of the Week: 3 Easy Exercises Designed for Office Workers

You wouldn’t think that sitting at a desk all day could have many detrimental effects to the body, but the opposite is actually true: remaining stationary throughout the day, especially in a slouching position, can cause considerable stress and discomfort. This discomfort, in addition to decreasing morale, can be a distraction that cuts into the productivity of workers throughout the day.

If you’re experiencing the ill health effects of poor desk posture, try these exercises at home--you’ll see why in a moment--to relieve many of the negative symptoms by stretching out your cramped and compressed muscles.

Get rocking...
On all fours, carefully rock back and forth. When rocking back, your hips should move down towards your feet, extending your back for a stretch across the lower portion of your spine, relaxing the stretch when returning to the forward position. For an added bonus in your upper back and neck, nod your head as you rock, bringing your chin to and from your chest.

… and rolling.
Starting off by laying on your stomach with your arms above your head, alternatively lift your arms and use their weight to roll over a few times on each side. Be sure to use the weight of your arm to roll, rather than bracing against the ground and pushing yourself over.

Also, get back to the basics.
With remarkably few exceptions, human beings start moving on all fours. Use that as an inspiration during your next exercise and crawl forwards and backwards, focusing on moving your hips as much as possible. While moving backwards, get a good stretch in your neck by turning your head from side to side.

Hopefully, it is now clear why these exercises are better done at home. Unless your office has a dedicated exercise area, there simply is not space for employees to do such things, never mind how distracting such activities would be for the other employees to work around. Therefore, since these activities are intended to assist office workers in remaining comfortable and focused, this is a bit of work that people should really take home with them.

An uncomfortable employee is an unproductive employee--fortunately, the opposite is also true. Encouraging your employees to take care of their bodies will not only help them feel their best, but also help them remain more productive for your business.

For more office productivity tips, keep checking back to the Total Tech Care blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 14 October 2019
If you'd like to register, please fill in the username, password and name fields.

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Tip of the Week Security Technology Best Practices Cloud Privacy Business Computing Hosted Solutions Hackers Backup Microsoft Business Google Network Security Malware Software Efficiency Internet Innovation Workplace Tips Email Data Mobile Devices User Tips Hardware communications Computer Productivity Productivity Disaster Recovery Business Continuity IT Services Smartphones VoIP Smartphone Browser Miscellaneous Network Windows 10 Android Server Outsourced IT Business Management Upgrade Managed IT Services Tech Term Communication Small Business Office Windows Chrome Cloud Computing Cybercrime IT Support Save Money Data Backup Windows 10 Virtualization Managed IT Services Computers Social Media Collaboration Gadgets Holiday IT Support Mobile Device Hacking Microsoft Office Alert Cybersecurity Data Recovery Quick Tips Managed Service Provider Ransomware Telephone Systems Automation Internet of Things Recovery Employer-Employee Relationship BYOD Artificial Intelligence Saving Money Mobile Device Management Passwords Spam Operating System Social Engineering Mobility Office 365 Users Router Phishing Application Health Money Remote Monitoring Applications App Law Enforcement Facebook Mobile Computing VPN Wi-Fi Bandwidth Password Remote Computing Networking Information Office Tips History BDR How To Private Cloud Information Technology Entertainment Website Settings Word Budget Managed IT Bring Your Own Device Data Management Two-factor Authentication Work/Life Balance Mouse HaaS Encryption Data Breach Managed Service Big Data Google Drive Avoiding Downtime Flexibility Training Marketing Gmail IT solutions Save Time Data Protection USB Display Firewall Data Storage Human Resources Cleaning Vulnerability Virtual Reality Paperless Office Apps Windows 7 Scam Blockchain User Error Education Staff Safety Meetings Connectivity Sports Redundancy Keyboard Data Security Infrastructure Hacker Government Voice over Internet Protocol Wireless The Internet of Things WiFi Lithium-ion battery Bluetooth Downtime Vendor Hiring/Firing Environment Data storage Fax Server Automobile Comparison Botnet IT Consultant Computing Infrastructure SaaS Virtual Assistant Processor CES Access Control Business Intelligence Humor Apple Patch Management Telephone System Content Management Worker Network Congestion eWaste Machine Learning Social IT Management Battery End of Support Shadow IT Servers Legal Software as a Service IT Plan Physical Security Internet Exlporer Vendor Management Update Wearable Technology Unsupported Software PDF Retail Hard Drives HIPAA Instant Messaging Charger Digital Signage Robot Excel Virus Proactive IT Augmented Reality Telephony Google Docs Biometrics OneNote Identity Theft Computer Care Risk Management Best Practice Unified Threat Management Computer Accessories YouTube Samsung Black Market Help Desk DDoS Cryptocurrency Fraud Value Document Management Printer Solid State Drive Electronic Medical Records Wireless Technology Spam Blocking Wireless Internet Cryptomining Programming Screen Mirroring Amazon How to Loyalty File Sharing Managed Services Provider Customer Service Frequently Asked Questions Recycling Files Troubleshooting Windows 10s Printer Server Chromecast Camera Managed IT Service Hosted Computing Wire Database Cast Amazon Web Services Antivirus Colocation Books Uninterrupted Power Supply Business Technology Windows Server 2008 R2 Tip of the week Criminal Windows 8 webinar Public Cloud Employer Employee Relationship Virtual Private Network IT service Inventory Smart Office Manufacturing Online Shopping Assessment Monitor Security Cameras Emergency Windows Server 2008 Tablet Conferencing Specifications Going Green Project Management Domains Travel Streaming Media Biometric Security Evernote Television Reputation Employee/Employer Relationship IaaS Tech Support Hard Drive Maintenance Content Audit Millennials Techology Laptop Warranty Authentication Bloatware 5G Wireless Charging Public Computer Customers Virtual Machine Consultant Tablets Audiobook Entrepreneur Computer Fan Workforce Analytics Rootkit Touchpad Administrator Mobile Office Nanotechnology Smartwatch HVAC OLED Cables Advertising Transportation Hypervisor Shortcut Flash Best Available Politics Workers WIndows 7 Cost Management FENG Telecommuting Microchip Employee Notifications Enterprise Content Management Cabling Social Networking Cortana IBM Benefits MSP Saving Time Sync Digital Signature Remote Work Search Engine Devices Running Cable Password Management Default App Software Tips Google Apps Supercomputer Relocation Smart Technology Procurement Accountants Memory Emails User PowerPoint Video Games Windows Media Player Bing Thought Leadership Google Search NIST IT Infrastructure Virtual Desktop Worker Commute Current Events Two Factor Authentication Remote Worker Bitcoin Skype Experience Netflix Managing Stress Root Cause Analysis Credit Cards Scalability Addiction Net Neutrality Investment HBO Password Manager Science Business Owner Knowledge Cameras NarrowBand Wiring Batteries Start Menu Smart Tech Multi-Factor Security Cache ISP Data loss Search Shortcuts SharePoint Distributed Denial of Service Safe Mode ROI Customer Relationship Management Outlook Business Mangement Leadership iPhone Music Trending GDPR Remote Workers Tools Practices Analyitcs

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code