Future working is here

1 August 2019 Security Services & Risk Management

The workforce of the future is a much talked about notion which conjures up images of robots manning the phones and commuters in flying cars. Yet while some of these ideas remain far-fetched, today’s technological landscape is advancing at such an impressive rate that many concepts which seemed futuristic only a few years ago are now very much a reality.

Employees can work with greater mobility and a more diverse array of devices than ever before, and each passing day seemingly brings with it a new technology which opens additional doors for organisations to enhance their daily operations through IT. 5G’s impending arrival will undoubtedly fuel this further, delivering greater functionality across a host of technologies including cloud and edge computing, assisted and virtual reality, wearable devices, and AI and automation.

As the workforce contends with and adapts to this evolving landscape, Gartner says technology spend is on the rise – demonstrating the vital role of the CIO and their team in ensuring maximum operational efficiency and security in a challenging time.

Unprecedented mobility

Arguably the most evident impact of the convergence of these technologies is the ongoing explosion of mobile working. Strategy Analytics predicts 1,88 billion mobile workers by 2023 – or 43,3 percent of the global workforce. This is driven by technologies such as cloud computing – allowing easy access and storage to information from anywhere, as well as collaborative work across any number of locations – as well as the incremental upgrade of cellular networks to bring enhanced speed and lower latency to organisations.

5G is of course the impending and next iteration of this, and promises to also pave the way for a new generation of IoT-enabled devices. Smart watches, for example, can enable quick and nimble functionality to office workers on the move. And more significantly, tools such as smart glasses will revolutionise many jobs, in particular by delivering hands-free working to those in heavy industries such as engineering, manufacturing and logistics. Such innovations owe much to the growing prominence of edge computing, with Strategy Analytics predicting that by 2025, 59 percent of IoT deployments will process data through edge computing in some form.

Traditional enterprise hardware in the form of laptops will undoubtedly, though, remain integral to day-to-day operations. Becoming ever more lightweight, powerful and secure, devices such as the Portégé X30T have been designed to accommodate the increasingly mobile needs of today’s workforce. The challenge for IT managers comes in ensuring the device fleet continues to meet these evolving needs, meaning longer-term device strategy is becoming a more important consideration. ‘PC as a Service’, within which business devices and services are subscribed to rather than owned, is therefore emerging as an effective business model to achieve a tech refresh not just now, but on an ongoing basis.

Security remains the biggest consideration

One common service offered within such models is data recovery, and the one-year anniversary of the introduction of GDPR is a timely reminder that organisations must prioritise security above everything else in this data-driven landscape. 10,52 billion malware attacks were logged in 2018, the most ever recorded by SonicWall, and today’s workforce also needs to adjust to the wider threat landscape created by the arrival of wearables and other IoT solutions. A Ponemon Institute study found there has been a dramatic increase in IoT-related data breaches since 2017, specifically due to unsecured IoT devices or applications.

It’s therefore abundantly clear that IT managers need to have the right solutions in place to combat this threat, while also ensuring employees are self-aware and educated about the importance of data security and their growing role in protecting the network. Many of the aforementioned solutions deliver robust security, which is often a core reason behind their growing adoption. Mobile edge computing solutions, for example, enable data to be locally encrypted and translated to a communication protocol before being sent to the company’s network core via the cloud.

Solutions alone, though, are not enough, which is why almost half (48 percent) of Europe’s IT decision makers consider training and educating staff around technology a key investment priority currently. The future is here for today’s workforce and provides ample opportunity for organisations and their employees to streamline operations and enhance productivity, simultaneously enabling CIOs to positively impact the bottom line. It is imperative that, in order to achieve this, employees are also invested in to maximise the potential – and minimise the risks – of these technologies.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The security debt hidden in residential estates
Security Services & Risk Management Integrated Solutions Residential Estate (Industry)
Many residential estates undermine their own security not through a lack of technology, but through hidden weaknesses in gate design, fragmented systems, recurring software dependence, weak operational ownership, and insufficient estate management input.

Read more...
Verification is reshaping South Africa’s labour market
Security Services & Risk Management Asset Management Commercial (Industry)
Hiring faster, trusting less: in a labour market defined by both constraint and potential, the ability to hire with confidence may well become one of the most important competitive advantages.

Read more...
Africa’s opportunity to shape the future of human-centred AI
AI & Data Analytics Security Services & Risk Management
Across the Global South, countries are not yet locked into decades of legacy AI systems, energy-intensive infrastructure, or governance frameworks designed for a different technological era. That creates something rare in technology development: a cleaner slate.

Read more...
AURA appoints Taryn Winer as global head of people
News & Events Security Services & Risk Management
Following its €13,5 million Series B funding round last year and accelerating international expansion, particularly across the United States, AURA has appointed Taryn Winer as global head of people.

Read more...
95% do not have full trust in cybersecurity vendors
Information Security Security Services & Risk Management
Trust in cybersecurity vendors is fragile, difficult to measure, and increasingly shaping risk posture at both operational and board levels. Lack of verifiable transparency undermines cybersecurity decision-making, according to Sophos-backed research.

Read more...
Enhancing control room operations
iFacts Security Services & Risk Management Surveillance
As South Africa faces complex and more advanced security challenges, the demand for advanced surveillance solutions, including CCTV and security control rooms, continues to surge, but what about the people in front of the screens?

Read more...
Understanding the Shared Responsibility Model
Infrastructure Security Services & Risk Management
While the cloud can certainly be a growth enabler in many ways, it can also introduce new security risks. Companies want to have a clear understanding of where their security duties end and where their cloud service provider’s begin.

Read more...
“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.