Empower your infrastructure and people for effective remote working

Security

Photo of Manoj Bhatt

Manoj Bhatt

Head of Cyber Security and Advisory, Telstra Purple LinkedIn

Telstra Purple‘s Manoj Bhatt guides us through how to empower people and infrastructure for effective, secure remote working during the Covid-19 pandemic.

Man remote working from balcony at sundown

With the onset of the Covid-19 pandemic, working from home has become the new business normal. Despite the requisite technology and tools being available for years, it has only been in recent months that organisations started remote working at scale – prompted by workplace health and safety considerations as well as legal requirements to minimise the spread of infection.

Almost nine in ten (88%) companies globally have encouraged or required employees to work from home due to coronavirus, according to Gartner.

But most employees’ home technology wasn’t designed to support enterprise use cases, particularly when all members of the household go online at the same time. And the speed and urgency of the migration to home working during a pandemic has been a wake-up call for both employees and employers alike.

Against this backdrop, how can organisations empower their infrastructure and people to work securely and productively from their living rooms, home offices and kitchens?

Learn more

Related Insights

The Cybersecurity needed to fight state sponsored attacks

In this edition of AI Magazine, Manoj Bhatt contributes his perspective on the rising threats and vulnerabilities that have emerged during the global pandemic and how business security must adapt.

Learn more

The critical role of mobile and cloud security for business success

Following our recent survey of industry leaders to identify the main enablers of business agility, Manoj Bhatt highlights the essential mobile and cloud security components that business must include in their move forward approach.

Learn more

Easing the headache of third-party risk assessments

Manoj Bhatt joins an Infosecurity Magazine panel talk explaining how security teams can conduct efficient and accurate assessments of the security vulnerabilities in third parties.

Learn more