As our cloud-based office setup was already in place, implementing WFH required minimal technical effort


As our cloud-based office setup was already in place, implementing WFH required minimal technical effort

Avaneesh Kumar Vats
Head (IT) - Convergence Energy Services


Key priorities for 2021
Digital has become a buzzword. It is treated differently across sectors and industries, and thus has many meanings. What we can agree on is that every organisation seeks to transform itself using digital technologies. Technology leaders will also agree on technology’s all-pervasiveness, and the need for organisations to not only embrace technology, but to position themselves to harness it as a tool to aid their strategic transformation.


Adopting Work-From Anywhere
Though working from home is not possible for every industry, most have implemented some variation of remote working, as it can support business continuity and help prevent the spread of Covid. Major changes implemented include providing the workforce with collaboration tools to work from home. These include online, virtual private network (VPN) secured applications including shared virtual folders, email, and eOffice, a digital solution to access and exchange files, documents and SAP, along with other office collaboration and meeting tools.


As our cloud-based office setup was already in place, implementing WFH required minimal technical effort. Constant connectivity was ensured across the organisation through mobile apps and the provision of laptops for all employees. Further, monthly reviews of Business Verticals and Support Functions were conducted at the highest level of management to assess target achievement via virtual meetings.


Redesigning IT & Security strategy
The risk of cyberattacks and confidentiality breaches are higher due to WFH, especially if employees are using their personal laptops or devices to perform official duties and connect to the company network. Organisations will need to look at digital innovation across the dimensions of people, process, data, and technology. Companies should have an existing data protection confidentiality and security policy for this purpose. Having a robust IT system with the necessary safeguards, including anti-virus protection, secured VPN and firewalls against cyber threats installed on the devices is critical. Not only do social media platforms provide hackers access to personal information, but certain sites also allow them to reveal someone’s exact location at any time.


Mobile cybersecurity risks are evolving at the same time as mobile technology. Smartphones, which today carry more data than older devices, are now used by 45% of mobile phone owners. Any new phone, tablet, or laptop provides a new way for a cybercriminal to access someone’s personal information. Since many mobile devices can be charged by plugging them into computers, sharing charging ports with others can result in device malware issues. All such issues can be handled by security policies and discipline.



Copyright @1999-2022 - All rights reserved.
Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.
Other Initiatives : |