The new normality, a concept reiterated in countless articles and discussions, which translated into the computer landscape also means and above all the massive adoption of smart working.

Talking about smart working also means, finally, digital transformation applied. But with what strategies, how much planning? Very often, in fact, we have noticed an uncontrolled race towards the adoption of work at a distance.

We deliberately used the definition of remote work and not smart working, because to think that just connect a remote laptop to be able to define a smart work is really misleading. In fact, there are no other parameters, one on all cybersecurity.

Often, computer security has been partially or completely ignored, taken by the urgency of not interrupting business continuity. If this thoughtful decision or result of haste was partly understandable in the early days of the coronary virus emergency, it is no longer acceptable today.

And here comes the theme “new normality”: out of the emergency management, now is the time to lay solid foundations for a new way of working that (no use to be deceived) is destined to accompany companies of every size for a long time, if not forever.

Moreover, the drastic change in the organisation entails the urgent need to rethink, often from scratch, the management of company computer security. It is difficult to imagine that the same cybersecurity ecosystem adopted to defend (for example) a well-defined business perimeter can function without adapting to a completely fluid situation, with a predominant number of employees working from home environments and even with their own devices

The complexity of the situation and its implications deserves careful reflection: it is important to design immediately the digital transformation post-covid, in order to continue to work to the maximum of its potential without taking unnecessary computer risks.

At 01net we are well aware of the centrality of these issues, and we decided to involve in our special the most authoritative companies operating in the field of cybersecurity. This has resulted in wide-ranging reflections, interwoven with the weight of endpoints and company policies, management of mixed work environments and user awareness, as well as the importance of training activities in the field of computer security.

For the special, we have given the floor so far to:




Check Point











Trend Micro

Leave a Reply

Your email address will not be published.

You May Also Like