Future working is here

1 August 2019 Security Services & Risk Management

The workforce of the future is a much talked about notion which conjures up images of robots manning the phones and commuters in flying cars. Yet while some of these ideas remain far-fetched, today’s technological landscape is advancing at such an impressive rate that many concepts which seemed futuristic only a few years ago are now very much a reality.

Employees can work with greater mobility and a more diverse array of devices than ever before, and each passing day seemingly brings with it a new technology which opens additional doors for organisations to enhance their daily operations through IT. 5G’s impending arrival will undoubtedly fuel this further, delivering greater functionality across a host of technologies including cloud and edge computing, assisted and virtual reality, wearable devices, and AI and automation.

As the workforce contends with and adapts to this evolving landscape, Gartner says technology spend is on the rise – demonstrating the vital role of the CIO and their team in ensuring maximum operational efficiency and security in a challenging time.

Unprecedented mobility

Arguably the most evident impact of the convergence of these technologies is the ongoing explosion of mobile working. Strategy Analytics predicts 1,88 billion mobile workers by 2023 – or 43,3 percent of the global workforce. This is driven by technologies such as cloud computing – allowing easy access and storage to information from anywhere, as well as collaborative work across any number of locations – as well as the incremental upgrade of cellular networks to bring enhanced speed and lower latency to organisations.

5G is of course the impending and next iteration of this, and promises to also pave the way for a new generation of IoT-enabled devices. Smart watches, for example, can enable quick and nimble functionality to office workers on the move. And more significantly, tools such as smart glasses will revolutionise many jobs, in particular by delivering hands-free working to those in heavy industries such as engineering, manufacturing and logistics. Such innovations owe much to the growing prominence of edge computing, with Strategy Analytics predicting that by 2025, 59 percent of IoT deployments will process data through edge computing in some form.

Traditional enterprise hardware in the form of laptops will undoubtedly, though, remain integral to day-to-day operations. Becoming ever more lightweight, powerful and secure, devices such as the Portégé X30T have been designed to accommodate the increasingly mobile needs of today’s workforce. The challenge for IT managers comes in ensuring the device fleet continues to meet these evolving needs, meaning longer-term device strategy is becoming a more important consideration. ‘PC as a Service’, within which business devices and services are subscribed to rather than owned, is therefore emerging as an effective business model to achieve a tech refresh not just now, but on an ongoing basis.

Security remains the biggest consideration

One common service offered within such models is data recovery, and the one-year anniversary of the introduction of GDPR is a timely reminder that organisations must prioritise security above everything else in this data-driven landscape. 10,52 billion malware attacks were logged in 2018, the most ever recorded by SonicWall, and today’s workforce also needs to adjust to the wider threat landscape created by the arrival of wearables and other IoT solutions. A Ponemon Institute study found there has been a dramatic increase in IoT-related data breaches since 2017, specifically due to unsecured IoT devices or applications.

It’s therefore abundantly clear that IT managers need to have the right solutions in place to combat this threat, while also ensuring employees are self-aware and educated about the importance of data security and their growing role in protecting the network. Many of the aforementioned solutions deliver robust security, which is often a core reason behind their growing adoption. Mobile edge computing solutions, for example, enable data to be locally encrypted and translated to a communication protocol before being sent to the company’s network core via the cloud.

Solutions alone, though, are not enough, which is why almost half (48 percent) of Europe’s IT decision makers consider training and educating staff around technology a key investment priority currently. The future is here for today’s workforce and provides ample opportunity for organisations and their employees to streamline operations and enhance productivity, simultaneously enabling CIOs to positively impact the bottom line. It is imperative that, in order to achieve this, employees are also invested in to maximise the potential – and minimise the risks – of these technologies.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

From digital transformation to digital sovereignty
Security Services & Risk Management IoT & Automation
As cyberthreats grow, data regulations tighten, and AI becomes central to economic competitiveness, countries are recognising the need to control and protect their own digital assets.

Read more...
The age of Lean 4.0: Orchestrating intelligence and efficiency
Security Services & Risk Management
The convergence of Lean principles and AI (what we now call Lean 4.0) is no longer a theoretical exercise; it is the defining operational paradigm for survival and growth in a complex, data-intensive economy.

Read more...
Risks of open-source intelligence escalating in crime
Security Services & Risk Management Residential Estate (Industry) Smart Home Automation
CMS estimates that open-source intelligence has played a role in 20 - 30% of robberies over the past 12 months. In cybercrime, global research consistently shows that many offences rely on some form of open-source data exploitation.

Read more...
Seeing is no longer believing
Security Services & Risk Management
Fraud has shifted. It is no longer just about financial theft; it is about identity theft in the most visceral sense. The most effective control is often completely non-technical: the ‘pause and verify’ rule.

Read more...
The year of machine deception
Security Services & Risk Management AI & Data Analytics
The AU10TIX Global Fraud Report, Signals for 2026, warns of the looming agentic AI and quantum risk, leading to a surge in adaptive, self-learning fraud, and outlines how early warning systems are fighting back.

Read more...
Smarter access, stronger defence
Secutel Technologies Security Services & Risk Management Access Control & Identity Management Retail (Industry)
The holiday season brings excitement, increased foot traffic and, unfortunately, a spike in criminal activity targeting retail environments. Taking a proactive approach to security is essential in ensuring staff and assets remain safe.

Read more...
SA availability of immutable backup storage appliance
CASA Software Infrastructure Security Services & Risk Management
CASA Software has launched the newly released Nexsan VHR-Series, a fully integrated, enterprise-class, immutable backup storage appliance purpose-built for Veeam software environments, with usable capacity ranging from 64 TB to 3,3 PB.

Read more...
Beagle Watch named best security company in Johannesburg
News & Events Security Services & Risk Management
Beagle Watch Armed Response has been named Johannesburg’s Best Security Company in the 2025 Best of Joburg Awards, surpassing about 26 nominated private security firms in the greater Johannesburg region, thanks to overwhelming public support.

Read more...
The HR Trap
Security Services & Risk Management Training & Education
When human resources becomes a risk factor. Andre du Venage examines why your CCTV security and other technology risks are covered, but human resources are often overlooked.

Read more...
AI rewrites financial crime
Security Services & Risk Management Financial (Industry)
Criminals are exploiting South Africa’s high connectivity and still-maturing regulation to scale attacks faster than we can defend them. The speed and sophistication of these scams are outpacing the systems designed to stop them.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.