Companies and smart working – let’s clarify
Let’s start with some clarity: smart working and teleworking are not the same thing. The second is what the British call “agile work” and means having a work contract that allows you not to have to attend company offices to work. Smart working involves a few days a week spent working remotely, typically at home.
This article deals with smart working in the general sense of a work methodology that does not involve the use of an office.
Advantages of smart working
With the rapid development of technology, employees can now work from anywhere in the world. The days when they were assigned to a desk have passed. Smart working is changing the concept of work.
Smart work starts from the assumption that “work is an activity and not a place”. Paul Allsop, founder of the Agile Organization, defines this new concept of work as follows:
Agile work consists in bringing together people, processes, connectivity, technology, time and place to find the most appropriate and effective way of working to perform a certain task. It works according to the guidelines (of the activity) but without boundaries (of how you reach it).
Once free to work remotely, employees feel emancipated, are prone to innovation and are generally more productive. Employees are more motivated and smart working leads to better customer satisfaction. Ultimately, there is a better profit for the company.
The definition of smart working is rather confusing. Every company, even within a specific sector, has its own way of working. There are no strict rules on how smart working is done.
There are basically four factors to consider when setting up a remote work system:
– Time: when you work
– Role: what do you do
– Place: where you work
– Sources: teams and activities
Regardless of what the smart working methods are, the company that wants to offer it, must provide adequate infrastructure to carry out remote activities.
All the evidence and data indicate that smart working works very well and offers discrete benefits for both the company and the employee. But one must be aware of the possible problems that this entails:
– Lack of trust and responsibility
– Corporate culture absent
– Resistance to change
– Difficulty in the technological approach by employees
– Lack of responsibility and tolerance of behavioral problems
Once these problems are overcome, there will be a solid foundation on which to grow and develop a company by embracing new advantageous working methods.
Adequate company structure
In order to offer teleworking to their employees, or a smart working solution, companies must have some essential tools. Not being physically present in the office, but having to work as if they were necessary, employees must be able to take advantage of adequate infrastructure to perform their duties.
For tariff some examples:
– Corporate laptop for employees involved in smart working
– Cloud storage service for versatile data sharing
– Teleconferencing tool to facilitate communication
– Infrastructure monitoring system for data operation and control of the operation of the machines involved
– VPN to create and manage dedicated and secure networks
Companies today can count on technologies that allow them to support this work structure easily and in an economic way. By implementing virtualization solutions, relocating your human resources becomes quite simple.
The virtualization of resources can take place at different levels and offer adequate solutions for every need. There are three main ways of virtualization.
With this a model, virtualized hardware resources are made available. The company can create and manage, according to its needs, a private cloud infrastructure, without worrying about where resources are allocated.
Examples: Amazon Elastic Cloud Compute (EC2), Google Cloud Engine, SOD SuperCloud.
In this model, online platforms are offered, thanks to which the user can release the web applications and services that he intends to provide to third parties. You can develop and run your own applications through the tools provided by the provider, which guarantees the correct functioning of the underlying infrastructure.
Examples: Amazon Relational Database Service (RDS), Google Cloud SQL
This model includes applications and software accessible from any type of device, through the simple use of a client interface. In this way, the user does not have to worry about managing resources and not even the infrastructure, as they are controlled by the provider that provides them.
Examples: G Suite, SOD Cloud Web Conference, SOD ownCloud, etc.
Smart working is increasingly popular and we can expect it to be the standard in the not too distant future. In order to support it, the company must have adequate services and infrastructures that support the workload.
The advantage is also guaranteed by the fact that the virtualization of resources is offered as a scalable service, capable of growing and adapting to the size of the company.
- The threat of DDoS ransomware
- Procedural Security Analysis – Thank you for contacting us!
- Zombie phishing: beware of emails, it could be zombies
- Social engineering: how hackers scam their victims
- What is phishing? Understanding and identifying social engineering attacks
- Avoid Ransomware: That’s why it’s best not to take any risks
- Double extortion ransomware: What they are and how to defend yourself
- Zero-Day attack: what they are and how to defend yourself with SOCaaS
- Backup as a Service (2)
- Cloud Conference (3)
- Cloud CRM (1)
- Cloud Server/VPS (20)
- Conferenza Cloud (4)
- ICT Monitoring (4)
- Log Management (2)
- News (17)
- ownCloud (4)
- Privacy (6)
- Secure Online Desktop (14)
- Security (6)
- Web Hosting (13)
- Inside Strata's Plans to Solve the Cloud Identity Puzzle February 25, 2021Strata Identity was founded to change businesses' approach to identity management as multicloud environments become the norm.
- Microsoft Releases Free Tool for Hunting SolarWinds Malware February 25, 2021Meanwhile, researchers at SecurityScorecard say the "fileless" malware loader in the attack - Teardrop - actually dates back to 2017.
- North Korea's Lazarus Group Expands to Stealing Defense Secrets February 25, 2021Several gigabytes of sensitive data stolen from one restricted network, with organizations in more than 12 countries impacted, Kaspersky says.
- Ransomware, Phishing Will Remain Primary Risks in 2021 February 25, 2021Attackers have doubled down on ransomware and phishing -- with some tweaks -- while deepfakes and disinformation will become more major threats in the future, according to a trio of threat reports.
- Thousands of VMware Servers Exposed to Critical RCE Bug February 25, 2021Security experts report scanning activity targeting vulnerable vCenter servers after a researcher published proof-of-concept code.
- 5 Key Steps Schools Can Take to Defend Against Cyber Threats February 25, 2021Educational institutions have become prime targets, but there are things they can do to stay safer.
- How to Avoid Falling Victim to a SolarWinds-Style Attack February 25, 2021A multilayered, zero-trust security posture provides a better chance of fending off sophisticated supply chain attackers before it's too late.
- Cybercriminals Target QuickBooks Databases February 24, 2021Stolen financial files then get sold on the Dark Web, researchers say.
- New APT Group Targets Airline Industry & Immigration February 24, 2021LazyScript bears similarities to some Middle Eastern groups but appears to be a distinct operation of its own, Malwarebytes says.
- 61% of Malware Delivered via Cloud Apps: Report February 24, 2021Researchers report the majority of malware is now delivered via cloud applications - a jump from 48% last year.
- Backdoor.Win32.DarkKomet.irv / Insecure Permissions February 23, 2021Posted by malvuln on Feb 23Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/a229acff4e0605ad24eaf3d9c44fdb1b.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.DarkKomet.irv Vulnerability: Insecure Permissions Description: DarkKomet.irv creates an insecure dir named "Windupdt" under c:\ drive, granting change (C) permissions to authenticated user group. Standard users can rename...
- Trojan.Win32.Pluder.o / Insecure Permissions February 23, 2021Posted by malvuln on Feb 23Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/ee22eea131c0e00162e4ba370f396a00.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Trojan.Win32.Pluder.o Vulnerability: Insecure Permissions Description: Creates an insecure dir named "z_Drivers" under c:\ drive, granting change (C) permissions to authenticated user group. Pluder.o also creates several registry key...
- Trojan.Win32.Pincav.cmfl / Insecure Permissions February 23, 2021Posted by malvuln on Feb 23Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/9d296ebd6b4f79457fcc61e38dcce61e.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Trojan.Win32.Pincav.cmfl Vulnerability: Insecure Permissions Description: The trojan creates an insecure dir named "Windupdt" under c:\ drive, granting change (C) permissions to authenticated users group. Standard users can rename the...
- Trojan-Proxy.Win32.Daemonize.i / Remote Denial of Service February 23, 2021Posted by malvuln on Feb 23Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/61bec9f22a5955e076e0d5ddf6232f3f.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Trojan-Proxy.Win32.Daemonize.i Vulnerability: Remote Denial of Service Description: Daemonize.i listens on TCP port 5823, sending some junk packets to the trojan results in invalid pointer read leading to an access violation and […]
- Backdoor.Win32.Ketch.h / Remote Stack Buffer Overflow (SEH) February 23, 2021Posted by malvuln on Feb 23Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/63c55ad21e0771c7f9ca71ec3bfcea0f.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Ketch.h Vulnerability: Remote Stack Buffer Overflow (SEH) Description: Ketch makes HTTP request to port 80 for a file named script.dat, after process the server response of 1,612 bytes or more it […]
- Backdoor.Win32.Inject.tyq / Insecure Permissions February 23, 2021Posted by malvuln on Feb 23Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/833868d3092bea833839a6b8ec196046.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Inject.tyq Vulnerability: Insecure Permissions Description: The backdoor creates an dir named "hotfix" under c:\ drive granting change (C) permissions to the authenticated user group. Type: PE32 MD5:...
- IBM(R) Db2(R) Windows client DLL Hijacking Vulnerability(0day) February 23, 2021Posted by houjingyi on Feb 23A few months ago I disclosed Cisco Webex Teams Client for Windows DLL Hijacking Vulnerability I found : https://seclists.org/fulldisclosure/2020/Oct/16 In that post I mentioned "I will add more details 90 days after my report or a security bulletin available". Here it comes. NOTICE : This vulnerability seems did not get […]
- CIRA Canadian Shield iOS Application - MITM SSL Certificate Vulnerability (CVE-2021-27189) February 23, 2021Posted by David Coomber on Feb 23CIRA Canadian Shield iOS Application - MITM SSL Certificate Vulnerability (CVE-2021-27189)
- [KIS-2021-02] docsify <= 4.11.6 DOM-based Cross-Site Scripting Vulnerability February 20, 2021Posted by research on Feb 19-------------------------------------------------------------- docsify
- Backdoor.Win32.Bionet.10 / Anonymous Logon February 19, 2021Posted by malvuln on Feb 19Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/be559307f5cd055f123a637b1135c8d3.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Bionet.10 Vulnerability: Anonymous Logon Description: The backdoor listens on TCP port 12348 and allows anonymous logon credentials to be used to access an infected host. Type: PE32 MD5: be559307f5cd055f123a637b1135c8d3 Vuln ID:...
Cyber threat intelligence identify dangers before they cause damage Find threats before they become a problem… https://t.co/eoT3Mfmi7g
Analisi di Sicurezza Procedurale Verifica che le operazioni in azienda rispettino gli standard imposti per il trat… https://t.co/HYs4UsX3mP
VPN Aziendali connessioni protette sempre e dovunque Gran parte del lavoro ormai passa per la rete,la sicurezza dev… https://t.co/ZreMXSsS17
Ultimamente ci sono stati casi critici di ransomware degni di nota. L’Universita' Tor Vergata ha subito un attacco… https://t.co/oHVilx0VXx
There have been critical cases of ransomware of note lately. Tor Vergata University suffered an attack that knocked… https://t.co/FQYuyKdAv6