t cht lk surround the work itself . On the other hand , to create mechanisms to make improper access as hard as possible , reinforcing the reach and power of the company ’ s cybersecurity initiatives – even though the physical boundaries have been overcome after this period of acceleration of Digital Transformation in companies .
It is the biggest challenge for companies in these new times . After all , we certainly will not regress after this period . On the contrary , studies by MIT ( Massachusetts Institute of Technology ) indicate that the movement that pushed millions to work from home will not cease after the end of the pandemic .
The workforce will become more mobile and decentralized , flowing through different spaces .
In a survey of more than 1,400 global professionals , MIT registered that 100 % of respondents believe organizations should adopt a hybrid model , which mixes corporate workspaces and home offices .
Lucas Pereira , Head of Products at Blockbit
Gartner numbers also go along the same perception . According to research by the consultancy , 48 % of professionals will continue to work remotely at least part-time after the COVID-19 pandemic , with one in five people working remotely full time . From an organizational point of view , 75 % of the companies surveyed plan to maintain or increase remote work actions in the future .
However , it is important to mention that hybrid work will no longer mean the home office itself . The expectation is that , as reality allows for better displacements , the workforce will become more mobile and decentralized , flowing through different spaces . It means that the networks used for the traffic of sensitive information may not be what they used to be – and that standard protections are no longer enough .
In other words , this means that traditional versions of tools such as firewalls and , especially , VPNs , also need to evolve to keep up with the mobility and fluidity that working outside the office demands . It is necessary to have a layer of digital security capable of guaranteeing access to crucial systems , even when the employee is on a public network or in a region outside the pre-established range or recognized by the systems .
How do we achieve this level of protection ? The best tip is to bet on the most modern tools prepared for this scenario . It is also necessary to invest in knowledge about the needs and usage characteristics of the teams , understanding the different points of the operations . For example , while many threats are global , the types of phishing triggers and lures
76 INTELLIGENTCIO LATAM www . intelligentcio . com