ADVERTISEMENT
TechEconomy
Saturday, May 24, 2025
No Result
View All Result
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS
No Result
View All Result
Tech | Business | Economy
No Result
View All Result
Podcast

Home » Bridging the Gaps to Safeguard the Future of Hybrid Work 

Bridging the Gaps to Safeguard the Future of Hybrid Work 

Techeconomy by Techeconomy
April 26, 2023
in ConsumerTech
0
Top Cybercrime Trends Organisations Should Take Note of in 2023 by Emmanuel Asika
WRITER: Emmanuel Asika, Country Head, HP Nigeria

Emmanuel Asika

RelatedPosts

Trump Threatens 25% Levy on iPhones Made Abroad

Trump Threatens 25% Tariff on iPhones Made Outside U.S.

May 23, 2025

Vietnam Moves to Block Telegram Over Crime Links

May 23, 2025

The emergence of cultures within adaptable working models that facilitate improved flexibility and therefore well-being whilst generating new range of opportunities to innovate and increase productivity shows that hybrid work is here to stay.

A report by Gartner shows a sizeable 51% of US knowledge workers are projected to work ‘hybrid’ and 20% to work fully remotely in 2023.

Just as a Phillips Consulting (PCL) study reveals how Nigerian executives considered culture as one of the top factors to consider in their business strategy, moving from a 17% focus pre-COVID to a 44% focus in some cases to align with the future of work. 

Notably, these new dynamics signal new trajectories for security teams, as business protection is now more demanding because the path has become doubtful.

To mitigate this, emphasis must be on protecting endpoints – PCs and printers; the ‘focal point’ of most attacks. Thus, to detect, prevent, and control cyber threats, new cybersecurity strategies are required; to dispel the threats associated with lost or stolen devices by boosting remote PC management.  

Mitigating security slips  

It’s clear that 82% of security experts adopting a hybrid work model have slip-ups in their organization’s security architecture, a new research and a hybrid security report from HP Wolf Security reveals. The epicenter of the hybrid worker’s world is the endpoint.  

In fact, 84% of security experts agree that endpoint is where the most enterprise-damaging cyber-threats occur, and it’s the root of most security threats – be it a PC, smartphone, laptop, tablet, or complementary peripherals like printers. For malicious attackers, these devices can be a target entry point. 

Nonetheless, local networks may be compromised and misconfigured. But truly, endpoints are the link bridging unprotected technologies and imperfect users.

When devices are not provided with requisite routine enterprise protection, hybrid work models suffer and negatively affect productivity.

Significantly, machines and employees working remotely are likely to be without appreciable protection and left vulnerable. 

Furthermore, some employees who are confined to their comfort zone without assistance of knowledgeable coworkers makes them more prone to either opening an attachment containing malware or clicking on a risky link.

Employees likewise work in cafes, restaurants, and airports, and perhaps even living the digital nomad lifestyle abroad; they aren’t just working from home (WFH).

Actually, two-thirds (66%i) of security leaders and IT experts consequently concluded that the most pronounced cybersecurity weakness in their organization is the possibility for hybrid employees to be compromised – phishing, ransomware, and attacks via unsafe home networks are also cited as top enterprise risks. 

Forward-thinking organizations now seem focused on fine investment in securing hybrid work, with a commendable four-fifths i.e., 82% of security leaders increasing budgets threshold specifically for hybrid workers, and 71%of these leaders expect this focus to increase further in 2023. Yet, the impact of their budget must be targeted at the appropriate tools with a concentration on positioning the endpoint front and center of any hybrid security strategy.  


Leaving no stone unturned  

An improved remote management of devices, despite its attendant complexities, is most necessary as most major considerations for the IT and security teams, in this hybrid age.

Also, 70%i of security experts conclude that the risk of lost or stolen devices is prevalent in hybrid work. This triggers the question – when remote machines are powered down or offline, what happens?

Locating or safeguarding data on these devices could be tasking, and substantially risky if they either contain confidential trade secrets, personally identifiable information (PII), or intellectual property (IP). The reality here is that Cloud Technologies have helped to reduce the workload here, but they’re not 100% effective.  

Human-error risk tendency is rife with itinerant workers always on the move; same way there will always be unethical hackers lurking around for susceptible devices they can attack. This trend raises risks, exclusively in highly regulated sectors like government – where a lost or stolen laptop could mean a national security risk.  

Connecting with a fresh approach 

In Nigeria, an emerging economy, institutions are gradually deepening hybrid work models via infrastructure investments despite challenges of electricity, network coverage, low bandwidth, and affordability.

HP has also been working on designing a model of IT management connectivity solution hence, the new HP Wolf Connect service now enables IT to manage devices even when powered down or offline.  

So, for IT managers, what can they do to mitigate these concerns? Step one is to find a fresh approach to link remote computers over cellular networks. This implies that devices can be controlled even when turned off or offline.

Fundamentally, such functionality could be deployed to connect with lost or stolen devices and then lock and wipe them. This approach will not only lower the risk of data leaks and violations, but it can also moderate IT expenses by cutting cases of PC replacement or remediation.

A stronger and secure connection to remote computers also reduces the time and effort required to resolve support tickets.

Teams can precisely report where and when devices went missing, and how long it took to lock or erase them. Now, that’s a fresh approach to security. 

About 80% of institutions laid claims to have deployed numerous tools and policies to protect hybrid working staff. However, what’s vital now is that these tools and policies require a paradigm shift from old perimeter-focused thinking. Once again, endpoint must become the focus for applying protection in the hybrid age.

Accepting hardware-enforced security features and protection above, in, and below the OS – such as application isolation – will be strategic for protecting end-users without impacting on the freedoms that hybrid work admits. 

This model should be part of an approach to hybrid workplace security that takes into consideration the distinct threats and contextual challenges that are more common with flexible working. 

Incidentally, about two-thirds, representing 61% of corporations and leaders, are saying that protection of their hybrid workforce will be harder moving forward. This doesn’t necessarily have to be the case. Enhanced remote management and the adoption of hardware-enforced security, can help businesses unleash end-user productivity without alluring extra cyber risks.  

Consequently, businesses should upgrade to a hybrid work model, at a time when sustainable growth is strategically significant to all organizations, bearing a fine blend of tech tools and motivated people to optimize lasting productivity. This is the future of work.

Loading

Advertisements
MTN ADS

Author

  • Techeconomy
    Techeconomy

    View all posts
0Shares
Tags: Emmanuel AsikaHP HybridHybrid Work
Previous Post

Empowering Local Governments to Improve Access to Clean Water, Sanitation, Hygiene 

Next Post

Business Professional? Be a Judge in Africa’s Business Heroes Prize Competition 2023 

Techeconomy

Techeconomy

Related Posts

Trump Threatens 25% Levy on iPhones Made Abroad
Phones

Trump Threatens 25% Tariff on iPhones Made Outside U.S.

by Joan Aimuengheuwa
May 23, 2025
0

President Donald Trump has issued a threat to impose 50% tariff on goods from the European Union

Read more
Vietnam Moves to Block Telegram Over Crime Links

Vietnam Moves to Block Telegram Over Crime Links

May 23, 2025
Apple Offers Extra Trade-In Discounts in China to Win Back iPhone Buyers

Apple Offers Extra Trade-In Discounts in China to Win Back iPhone Buyers

May 23, 2025
Fortnite Hits #1 on U.S. App Store Less Than 24 Hours After Return From Five-Year Clash with Apple

Fortnite Hits #1 on U.S. App Store Less Than 24 Hours After Return From Five-Year Clash with Apple

May 21, 2025
Zoho Ulaa Enterprise

Zoho Launches Ulaa Enterprise, a Browser for Modern Workplaces

May 20, 2025
Microsoft to Scrap App Store Onboarding Fees from June 2025

Microsoft to Scrap App Store Onboarding Fees from June 2025

May 19, 2025
Next Post
Business Professional? Be a Judge in Africa’s Business Heroes Prize Competition 2023

Business Professional? Be a Judge in Africa’s Business Heroes Prize Competition 2023 

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Techeconomy Podcast

Techeconomy Podcast
Techeconomy Podcast

Infowave is brought to you by TechEconomy. Every week we will bring new stories from startups and influencers who are shaping and changing the world we live in. We’ll also bring you reports on topics you should know.

Follow us @techeconomyng for more.

TECH TALK EPISODE 2
byTecheconomy

PRODUCTIVITY AND WORK-Life Balance

TECH TALK EPISODE 2
TECH TALK EPISODE 2
May 22, 2025
Techeconomy
CYBERSECURITY ESSENTIALS
April 24, 2025
Techeconomy
Digital Marketing Trends and strategies for 2025 and beyond
February 27, 2025
Techeconomy
Major Lesson for Techies in 2024 and Projections for 2025
December 6, 2024
Techeconomy
Major Lessons for Techies in an AI-Driven World | Techeconomy Business Series Highlights
November 26, 2024
Techeconomy
Maximizing Profitability Through Seasonal Sales: Strategies For Success
November 8, 2024
Techeconomy
Techeconomy Business Series
October 15, 2024
Techeconomy
PRIVACY IN THE ERA OF AI: GETTING YOUR BUSINESS READY
May 30, 2024
Techeconomy
Unravel the Secrets of Marketing Everywhere All At Once with Isaac Akanni from Infobip | Infowave Podcast Episode 1
February 9, 2024
Techeconomy
The Role of Ed-tech in Life Long Learning and Continuous Education
October 19, 2023
Techeconomy
Search Results placeholder

WHAT IS TRENDING

https://www.youtube.com/watch?v=g_MCUwS2woc&list=PL6bbK-xx1KbIgX-IzYdqISXq1pUsuA4dz

Follow Us

  • About Us
  • Contact Us
  • Careers
  • Privacy Policy

© 2025 Techeconomy - Designed by Opimedia.

No Result
View All Result
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS

© 2025 Techeconomy - Designed by Opimedia.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.