Smart working Giacomo Lanzi

Companies and smart working – let’s clarify

Let’s start with some clarity: smart working and teleworking are not the same thing. The second is what the British call “agile work” and means having a work contract that allows you not to have to attend company offices to work. Smart working involves a few days a week spent working remotely, typically at home.

This article deals with smart working in the general sense of a work methodology that does not involve the use of an office.

Advantages of smart working

With the rapid development of technology, employees can now work from anywhere in the world. The days when they were assigned to a desk have passed. Smart working is changing the concept of work.

Smart work starts from the assumption that “work is an activity and not a place”. Paul Allsop, founder of the Agile Organization, defines this new concept of work as follows:

Agile work consists in bringing together people, processes, connectivity, technology, time and place to find the most appropriate and effective way of working to perform a certain task. It works according to the guidelines (of the activity) but without boundaries (of how you reach it).

Once free to work remotely, employees feel emancipated, are prone to innovation and are generally more productive. Employees are more motivated and smart working leads to better customer satisfaction. Ultimately, there is a better profit for the company.

In detail

 

The definition of smart working is rather confusing. Every company, even within a specific sector, has its own way of working. There are no strict rules on how smart working is done.

There are basically four factors to consider when setting up a remote work system:

   – Time: when you work
   – Role: what do you do
   – Place: where you work
   – Sources: teams and activities

Regardless of what the smart working methods are, the company that wants to offer it, must provide adequate infrastructure to carry out remote activities.

Possible obstacles

All the evidence and data indicate that smart working works very well and offers discrete benefits for both the company and the employee. But one must be aware of the possible problems that this entails:

   – Lack of trust and responsibility
   – Corporate culture absent
   – Resistance to change
   – Difficulty in the technological approach by employees
   – Lack of responsibility and tolerance of behavioral problems

Once these problems are overcome, there will be a solid foundation on which to grow and develop a company by embracing new advantageous working methods.

Adequate company structure

In order to offer teleworking to their employees, or a smart working solution, companies must have some essential tools. Not being physically present in the office, but having to work as if they were necessary, employees must be able to take advantage of adequate infrastructure to perform their duties.

For tariff some examples:

   – Corporate laptop for employees involved in smart working
   – Cloud storage service for versatile data sharing
   – Teleconferencing tool to facilitate communication
   – Infrastructure monitoring system for data operation and control of the operation of the machines involved
   – VPN to create and manage dedicated and secure networks

Smart Working

Business tools

Companies today can count on technologies that allow them to support this work structure easily and in an economic way. By implementing virtualization solutions, relocating your human resources becomes quite simple.

The virtualization of resources can take place at different levels and offer adequate solutions for every need. There are three main ways of virtualization.

Infrastructure-as-a-Service (IaaS)

With this a model, virtualized hardware resources are made available. The company can create and manage, according to its needs, a private cloud infrastructure, without worrying about where resources are allocated.
Examples: Amazon Elastic Cloud Compute (EC2), Google Cloud Engine, SOD SuperCloud.

Platform-as-a-Service (PaaS)

In this model, online platforms are offered, thanks to which the user can release the web applications and services that he intends to provide to third parties. You can develop and run your own applications through the tools provided by the provider, which guarantees the correct functioning of the underlying infrastructure.
Examples: Amazon Relational Database Service (RDS), Google Cloud SQL

Software-as-a-Service (SaaS)

This model includes applications and software accessible from any type of device, through the simple use of a client interface. In this way, the user does not have to worry about managing resources and not even the infrastructure, as they are controlled by the provider that provides them.
Examples: G Suite, SOD Cloud Web Conference, SOD ownCloud, etc.

Concluding

Smart working is increasingly popular and we can expect it to be the standard in the not too distant future. In order to support it, the company must have adequate services and infrastructures that support the workload.

The advantage is also guaranteed by the fact that the virtualization of resources is offered as a scalable service, capable of growing and adapting to the size of the company.

[btnsx id=”2931″]

Useful links:

ownCloud

Cloud servers

VPS Metered – Cloud location

SaaS – Software as a Service

 

Share


RSS

More Articles…

Categories …

Tags

RSS Unknown Feed

RSS Full Disclosure

  • iOS Activation Flaw Enables Pre-User Device Compromise and Identity Exposure (iOS 18.5) July 1, 2025
    Posted by josephgoyd via Fulldisclosure on Jun 30Title: iOS Activation Flaw Enables Pre-User Device Compromise Reported to Apple: May 19, 2025 Reported to US-CERT: May 19, 2025 US-CERT Case #: VU#346053 Vendor Status: Silent Public Disclosure: June 26, 2025 ------------------------------------------------------------------------ Summary ------------------------------------------------------------------------ A critical vulnerability exists in Apple’s iOS activation pipeline that allows...
  • Remote DoS in httpx 1.7.0 – Out-of-Bounds Read via Malformed <title> Tag June 26, 2025
    Posted by Brian Carpenter via Fulldisclosure on Jun 25Hey list, You can remotely crash httpx v1.7.0 (by ProjectDiscovery) by serving a malformed tag on your website. The bug is a classic out-of-bounds read in trimTitleTags() due to a missing bounds check when slicing the title string. It panics with: panic: runtime error: slice bounds out […]
  • CVE-2025-32978 - Quest KACE SMA Unauthenticated License Replacement June 24, 2025
    Posted by Seralys Research Team via Fulldisclosure on Jun 23 Seralys Security Advisory | https://www.seralys.com/research ====================================================================== Title: Unauthenticated License Replacement Product: Quest KACE Systems Management Appliance (SMA) Affected: Confirmed on 14.1 (older versions likely affected) Fixed in: 13.0.385, 13.1.81, 13.2.183, 14.0.341(Patch 5), 14.1.101(Patch 4) Vendor: Quest Software Discovered: April...
  • CVE-2025-32977 - Quest KACE Unauthenticated Backup Upload June 24, 2025
    Posted by Seralys Research Team via Fulldisclosure on Jun 23 Seralys Security Advisory | https://www.seralys.com/research ====================================================================== Title: Unauthenticated Backup Upload Product: Quest KACE Systems Management Appliance (SMA) Affected: Confirmed on 14.1 (older versions likely affected) Fixed in: 13.0.385, 13.1.81, 13.2.183, 14.0.341(Patch 5), 14.1.101(Patch 4) Vendor: Quest Software Discovered: April 2025...
  • CVE-2025-32976 - Quest KACE SMA 2FA Bypass June 24, 2025
    Posted by Seralys Research Team via Fulldisclosure on Jun 23 Seralys Security Advisory | https://www.seralys.com/research ====================================================================== Title: 2FA Bypass Product: Quest KACE Systems Management Appliance (SMA) Affected: Confirmed on 14.1 (older versions likely affected) Fixed in: 13.0.385, 13.1.81, 13.2.183, 14.0.341(Patch 5), 14.1.101(Patch 4) Vendor: Quest Software Discovered: April 2025 Severity: HIGH...
  • CVE-2025-32975 - Quest KACE SMA Authentication Bypass June 24, 2025
    Posted by Seralys Research Team via Fulldisclosure on Jun 23 Seralys Security Advisory | https://www.seralys.com/research ====================================================================== Title: Authentication Bypass Product: Quest KACE Systems Management Appliance (SMA) Affected: Confirmed on 14.1 (older versions likely affected) Fixed in: 13.0.385, 13.1.81, 13.2.183, 14.0.341(Patch 5), 14.1.101(Patch 4) Vendor: Quest Software Discovered: April 2025 Severity:...
  • RansomLord (NG v1.0) anti-ransomware exploit tool June 24, 2025
    Posted by malvuln on Jun 23First official NG versioned release with significant updates, fixes and new features https://github.com/malvuln/RansomLord/releases/tag/v1.0 RansomLord (NG) v1.0 Anti-Ransomware exploit tool. Proof-of-concept tool that automates the creation of PE files, used to exploit ransomware pre-encryption. Lang: C SHA256: ACB0C4EEAB421761B6C6E70B0FA1D20CE08247525641A7CD03B33A6EE3D35D8A Deweaponize feature PoC video:...
  • Disclosure Yealink Cloud vulnerabilities June 24, 2025
    Posted by Jeroen Hermans via Fulldisclosure on Jun 23Dear all, ---Abstract--- Yealink RPS contains several vulnerabilities that can lead to leaking of PII and/or MITM attacks. Some vulnerabilities are unpatched even after disclosure to the manufacturer. ---/Abstract--- We are Stefan Gloor and Jeroen Hermans. We are independent computer security researchers working on a disclosure process […]
  • : "Glass Cage" – Zero-Click iMessage → Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885) June 18, 2025
    Posted by josephgoyd via Fulldisclosure on Jun 17"Glass Cage" – Sophisticated Zero-Click iMessage Exploit ChainEnabling Persistent iOS Compromise and Device Bricking CVE-2025-24085, CVE-2025-24201(CNVD-2025-07885) Author: Joseph Goydish II Date: 06/10/2025 Release Type: Full Disclosure Platform Affected: iOS 18.2 (confirmed zero-day at time of discovery) Delivery Vector: iMessage (default configuration) Impact: Remote Code Execution, Privilege Escalation, Keychain […]
  • SEC Consult SA-20250612-0 :: Reflected Cross-Site Scripting in ONLYOFFICE Docs (DocumentServer) June 18, 2025
    Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Jun 17SEC Consult Vulnerability Lab Security Advisory < 20250612-0 > ======================================================================= title: Reflected Cross-Site Scripting product: ONLYOFFICE Docs (DocumentServer) vulnerable version:

Customers

Newsletter

{subscription_form_1}