{"id":8374,"date":"2024-01-15T11:50:49","date_gmt":"2024-01-15T09:50:49","guid":{"rendered":"https:\/\/www.microbase.gr\/?p=8374"},"modified":"2024-03-14T17:11:35","modified_gmt":"2024-03-14T15:11:35","slug":"hybrid-work-model","status":"publish","type":"post","link":"https:\/\/www.microbase.gr\/en\/hybrid-work-model\/","title":{"rendered":"Hybrid working | 10 do&#8217;s to ensure secure and continuous communication"},"content":{"rendered":"<p>According to research by <a href=\"https:\/\/www.ot.gr\/wp-content\/uploads\/2023\/10\/4AA8-3305ENW.pdf\">Forrester Consulting<\/a>, 72% of companies implement the hybrid work model.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-8577  alignleft\" src=\"https:\/\/www.microbase.gr\/wp-content\/uploads\/2024\/01\/MB_POST-BLOG-EN-2.png\" alt=\"MB_POST BLOG EN\" width=\"551\" height=\"462\" srcset=\"https:\/\/www.microbase.gr\/wp-content\/uploads\/2024\/01\/MB_POST-BLOG-EN-2.png 940w, https:\/\/www.microbase.gr\/wp-content\/uploads\/2024\/01\/MB_POST-BLOG-EN-2-768x644.png 768w, https:\/\/www.microbase.gr\/wp-content\/uploads\/2024\/01\/MB_POST-BLOG-EN-2-859x720.png 859w\" sizes=\"auto, (max-width: 551px) 100vw, 551px\" \/>Undoubtedly, the hybrid work model offers many benefits (for both the organization and the employees), but without overlooking the consequent cybersecurity challenges. It is optimistic to report that properly informed entrepreneurs can protect sensitive Endpoint data, protecting their overall business operations, efficiency, and reputation.<\/p>\n<p>Evolving with technology, cybersecurity risks* in the digital workplace find strong resistance to a streaming Endpoint management infrastructure to support this new way of working.<\/p>\n<p><em>*data breaches, malware attacks, camera hacking, ransomware, phishing, insider threats, IoT vulnerabilities, website breaches and more.<\/em><\/p>\n<p>Once the transition to a hybrid work environment is decided \u2013 to ensure control and protection of the company&#8217;s digital assets \u2013 the first step is to make mass adjustments to all Endpoints of employees, regardless of their location.<\/p>\n<p>Next &#8211; also a very important step &#8211; is ensuring the ability of suppliers to support the new work environment.<\/p>\n<p>Following the first actions, we recommend 10 basic do&#8217;s for safe and continuous hybrid work:<\/p>\n<ol>\n<li>Set up secure remote connections with VPN.<\/li>\n<li>Proceed with full disk encryption for substantial protection of the data hosted by the terminal devices.<\/li>\n<li>Establish a culture of discreet information sharing.<\/li>\n<li>Use strong passwords by changing them regularly and\/or use Multi Factor Authentication where possible.<\/li>\n<li>Organize frequent training of employees on safety issues and company policies.<\/li>\n<li>Update regularly the operating system and software of the remote devices.<\/li>\n<li>Install Endpoint Protection software with protection from Malware, Zero-Day Protection, Thread Extraction, Application Control and other protection and control mechanisms on all terminal devices.<\/li>\n<li>Perform routine security checks either sampled or automated, using Endpoint Protection solutions and\/or SIEM Agents.<\/li>\n<li>Set up a well thought out recovery plan. Cybersecurity crisis management plans are essential, along with necessary preventative measures.<\/li>\n<li>Keep up to date with the latest threats, technologies, and regulations.<\/li>\n<\/ol>\n<blockquote>\n<h2 style=\"text-align: center;\"><em><strong><span style=\"color: #ff6600;\">+1<\/span><\/strong><\/em><\/h2>\n<h2 style=\"text-align: center;\"><em><strong><span style=\"color: #ff6600;\">Trust the cybersecurity experts<\/span><\/strong><\/em><\/h2>\n<\/blockquote>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Undoubtedly, the hybrid work model offers many benefits (for both the organization and the employees), but without overlooking the consequent cybersecurity challenges.<\/p>\n","protected":false},"author":6,"featured_media":8577,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[64],"tags":[],"class_list":["post-8374","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hybrid working | 10 do&#039;s to ensure secure and continuous communication - Microbase<\/title>\n<meta name=\"description\" content=\"Undoubtedly, the hybrid work model offers many benefits (for both the organization and the employees), but without overlooking the consequent cybersecurity challenges.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microbase.gr\/en\/hybrid-work-model\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hybrid working | 10 do&#039;s to ensure secure and continuous communication\" \/>\n<meta property=\"og:description\" content=\"Undoubtedly, the hybrid work model offers many benefits (for both the organization and the employees), but without overlooking the consequent cybersecurity challenges.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microbase.gr\/en\/hybrid-work-model\/\" \/>\n<meta property=\"og:site_name\" content=\"Microbase\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-15T09:50:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-14T15:11:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microbase.gr\/wp-content\/uploads\/2024\/01\/MB_POST-BLOG-EN-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"940\" \/>\n\t<meta property=\"og:image:height\" content=\"788\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"margarita\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Hybrid working | 10 do&#039;s to ensure secure and continuous communication\" \/>\n<meta name=\"twitter:description\" content=\"Undoubtedly, the hybrid work model offers many benefits (for both the organization and the employees), but without overlooking the consequent cybersecurity challenges.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microbase.gr\/wp-content\/uploads\/2024\/01\/MB_POST-BLOG-EN-2.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"margarita\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microbase.gr\/en\/hybrid-work-model\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microbase.gr\/en\/hybrid-work-model\/\"},\"author\":{\"name\":\"margarita\",\"@id\":\"https:\/\/www.microbase.gr\/en\/#\/schema\/person\/15914b99e5e613e659bf9368b49e760a\"},\"headline\":\"Hybrid working | 10 do&#8217;s to ensure secure and continuous communication\",\"datePublished\":\"2024-01-15T09:50:49+00:00\",\"dateModified\":\"2024-03-14T15:11:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microbase.gr\/en\/hybrid-work-model\/\"},\"wordCount\":323,\"publisher\":{\"@id\":\"https:\/\/www.microbase.gr\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microbase.gr\/en\/hybrid-work-model\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microbase.gr\/wp-content\/uploads\/2024\/01\/MB_POST-BLOG-EN-2.png\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microbase.gr\/en\/hybrid-work-model\/\",\"url\":\"https:\/\/www.microbase.gr\/en\/hybrid-work-model\/\",\"name\":\"Hybrid working | 10 do's to ensure secure and continuous communication - Microbase\",\"isPartOf\":{\"@id\":\"https:\/\/www.microbase.gr\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microbase.gr\/en\/hybrid-work-model\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microbase.gr\/en\/hybrid-work-model\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microbase.gr\/wp-content\/uploads\/2024\/01\/MB_POST-BLOG-EN-2.png\",\"datePublished\":\"2024-01-15T09:50:49+00:00\",\"dateModified\":\"2024-03-14T15:11:35+00:00\",\"description\":\"Undoubtedly, the hybrid work model offers many benefits (for both the organization and the employees), but without overlooking the consequent cybersecurity challenges.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microbase.gr\/en\/hybrid-work-model\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microbase.gr\/en\/hybrid-work-model\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microbase.gr\/en\/hybrid-work-model\/#primaryimage\",\"url\":\"https:\/\/www.microbase.gr\/wp-content\/uploads\/2024\/01\/MB_POST-BLOG-EN-2.png\",\"contentUrl\":\"https:\/\/www.microbase.gr\/wp-content\/uploads\/2024\/01\/MB_POST-BLOG-EN-2.png\",\"width\":940,\"height\":788,\"caption\":\"MB_POST BLOG EN\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microbase.gr\/en\/hybrid-work-model\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u0391\u03c1\u03c7\u03b9\u03ba\u03ae\",\"item\":\"https:\/\/www.microbase.gr\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hybrid working | 10 do&#8217;s to ensure secure and continuous communication\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microbase.gr\/en\/#website\",\"url\":\"https:\/\/www.microbase.gr\/en\/\",\"name\":\"Microbase\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.microbase.gr\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microbase.gr\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microbase.gr\/en\/#organization\",\"name\":\"Microbase\",\"url\":\"https:\/\/www.microbase.gr\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microbase.gr\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microbase.gr\/wp-content\/uploads\/2020\/07\/Logo_Microbase.png\",\"contentUrl\":\"https:\/\/www.microbase.gr\/wp-content\/uploads\/2020\/07\/Logo_Microbase.png\",\"width\":1602,\"height\":350,\"caption\":\"Microbase\"},\"image\":{\"@id\":\"https:\/\/www.microbase.gr\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microbase.gr\/en\/#\/schema\/person\/15914b99e5e613e659bf9368b49e760a\",\"name\":\"margarita\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microbase.gr\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ea36d332cf2dbf84e6681fd54bc39599e804d7f4143fa38e735ac9bd582e95d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ea36d332cf2dbf84e6681fd54bc39599e804d7f4143fa38e735ac9bd582e95d6?s=96&d=mm&r=g\",\"caption\":\"margarita\"},\"url\":\"https:\/\/www.microbase.gr\/en\/author\/margarita\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hybrid working | 10 do's to ensure secure and continuous communication - Microbase","description":"Undoubtedly, the hybrid work model offers many benefits (for both the organization and the employees), but without overlooking the consequent cybersecurity challenges.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microbase.gr\/en\/hybrid-work-model\/","og_locale":"en_US","og_type":"article","og_title":"Hybrid working | 10 do's to ensure secure and continuous communication","og_description":"Undoubtedly, the hybrid work model offers many benefits (for both the organization and the employees), but without overlooking the consequent cybersecurity challenges.","og_url":"https:\/\/www.microbase.gr\/en\/hybrid-work-model\/","og_site_name":"Microbase","article_published_time":"2024-01-15T09:50:49+00:00","article_modified_time":"2024-03-14T15:11:35+00:00","og_image":[{"width":940,"height":788,"url":"https:\/\/www.microbase.gr\/wp-content\/uploads\/2024\/01\/MB_POST-BLOG-EN-2.png","type":"image\/png"}],"author":"margarita","twitter_card":"summary_large_image","twitter_title":"Hybrid working | 10 do's to ensure secure and continuous communication","twitter_description":"Undoubtedly, the hybrid work model offers many benefits (for both the organization and the employees), but without overlooking the consequent cybersecurity challenges.","twitter_image":"https:\/\/www.microbase.gr\/wp-content\/uploads\/2024\/01\/MB_POST-BLOG-EN-2.png","twitter_misc":{"Written by":"margarita","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microbase.gr\/en\/hybrid-work-model\/#article","isPartOf":{"@id":"https:\/\/www.microbase.gr\/en\/hybrid-work-model\/"},"author":{"name":"margarita","@id":"https:\/\/www.microbase.gr\/en\/#\/schema\/person\/15914b99e5e613e659bf9368b49e760a"},"headline":"Hybrid working | 10 do&#8217;s to ensure secure and continuous communication","datePublished":"2024-01-15T09:50:49+00:00","dateModified":"2024-03-14T15:11:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microbase.gr\/en\/hybrid-work-model\/"},"wordCount":323,"publisher":{"@id":"https:\/\/www.microbase.gr\/en\/#organization"},"image":{"@id":"https:\/\/www.microbase.gr\/en\/hybrid-work-model\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microbase.gr\/wp-content\/uploads\/2024\/01\/MB_POST-BLOG-EN-2.png","articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microbase.gr\/en\/hybrid-work-model\/","url":"https:\/\/www.microbase.gr\/en\/hybrid-work-model\/","name":"Hybrid working | 10 do's to ensure secure and continuous communication - Microbase","isPartOf":{"@id":"https:\/\/www.microbase.gr\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microbase.gr\/en\/hybrid-work-model\/#primaryimage"},"image":{"@id":"https:\/\/www.microbase.gr\/en\/hybrid-work-model\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microbase.gr\/wp-content\/uploads\/2024\/01\/MB_POST-BLOG-EN-2.png","datePublished":"2024-01-15T09:50:49+00:00","dateModified":"2024-03-14T15:11:35+00:00","description":"Undoubtedly, the hybrid work model offers many benefits (for both the organization and the employees), but without overlooking the consequent cybersecurity challenges.","breadcrumb":{"@id":"https:\/\/www.microbase.gr\/en\/hybrid-work-model\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microbase.gr\/en\/hybrid-work-model\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microbase.gr\/en\/hybrid-work-model\/#primaryimage","url":"https:\/\/www.microbase.gr\/wp-content\/uploads\/2024\/01\/MB_POST-BLOG-EN-2.png","contentUrl":"https:\/\/www.microbase.gr\/wp-content\/uploads\/2024\/01\/MB_POST-BLOG-EN-2.png","width":940,"height":788,"caption":"MB_POST BLOG EN"},{"@type":"BreadcrumbList","@id":"https:\/\/www.microbase.gr\/en\/hybrid-work-model\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u0391\u03c1\u03c7\u03b9\u03ba\u03ae","item":"https:\/\/www.microbase.gr\/en\/"},{"@type":"ListItem","position":2,"name":"Hybrid working | 10 do&#8217;s to ensure secure and continuous communication"}]},{"@type":"WebSite","@id":"https:\/\/www.microbase.gr\/en\/#website","url":"https:\/\/www.microbase.gr\/en\/","name":"Microbase","description":"","publisher":{"@id":"https:\/\/www.microbase.gr\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microbase.gr\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microbase.gr\/en\/#organization","name":"Microbase","url":"https:\/\/www.microbase.gr\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microbase.gr\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.microbase.gr\/wp-content\/uploads\/2020\/07\/Logo_Microbase.png","contentUrl":"https:\/\/www.microbase.gr\/wp-content\/uploads\/2020\/07\/Logo_Microbase.png","width":1602,"height":350,"caption":"Microbase"},"image":{"@id":"https:\/\/www.microbase.gr\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microbase.gr\/en\/#\/schema\/person\/15914b99e5e613e659bf9368b49e760a","name":"margarita","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microbase.gr\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ea36d332cf2dbf84e6681fd54bc39599e804d7f4143fa38e735ac9bd582e95d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ea36d332cf2dbf84e6681fd54bc39599e804d7f4143fa38e735ac9bd582e95d6?s=96&d=mm&r=g","caption":"margarita"},"url":"https:\/\/www.microbase.gr\/en\/author\/margarita\/"}]}},"_links":{"self":[{"href":"https:\/\/www.microbase.gr\/en\/wp-json\/wp\/v2\/posts\/8374","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microbase.gr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microbase.gr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microbase.gr\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microbase.gr\/en\/wp-json\/wp\/v2\/comments?post=8374"}],"version-history":[{"count":4,"href":"https:\/\/www.microbase.gr\/en\/wp-json\/wp\/v2\/posts\/8374\/revisions"}],"predecessor-version":[{"id":8579,"href":"https:\/\/www.microbase.gr\/en\/wp-json\/wp\/v2\/posts\/8374\/revisions\/8579"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microbase.gr\/en\/wp-json\/wp\/v2\/media\/8577"}],"wp:attachment":[{"href":"https:\/\/www.microbase.gr\/en\/wp-json\/wp\/v2\/media?parent=8374"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microbase.gr\/en\/wp-json\/wp\/v2\/categories?post=8374"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microbase.gr\/en\/wp-json\/wp\/v2\/tags?post=8374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}