A new survey shows that the vast majority of senior executives say would’ve approached their return-to-work push “differently.”

  • silvercove@lemdro.id
    link
    fedilink
    English
    arrow-up
    85
    arrow-down
    1
    ·
    11 months ago

    There are no arguments for returning to the office that make sense. People who argue against remote work are historical artefacts from a bygone age.

    • lemmyseizethemeans@lemmygrad.ml
      link
      fedilink
      arrow-up
      17
      arrow-down
      1
      ·
      edit-2
      11 months ago

      Well to be fair I wouldn’t categorize the entire banking industry and investment capitalists who have over a trillion dollars in commercial mortgage backed real estate collateralized debt obligations invested in those office buildings as being from a bygone era.

      TLDR It’s 2008 all over again. They bundled up commercial mortgages into securities that blackrock etc are heavily invested in. They are over leveraged because over the counter swaps still don’t require verified money in the bank to cover losses. If people are not forced to return they know the real estate market will implode and take Citibank Morgan Stanley etc with it

    • couragethebravedog@lemmy.world
      link
      fedilink
      arrow-up
      22
      arrow-down
      6
      ·
      edit-2
      11 months ago

      Security is definitely a legitimate argument for some companies. The average home network is nowhere near as secure as an enterprise network and BYOD is not nearly as secure as the systems setup and managed by your organization.

      Edit: Everyone saying “use a VPN that’s how you secure your home” needs to do more research. I have a comment below explaining how just using a VPN doesn’t make you safe.

      • silvercove@lemdro.id
        link
        fedilink
        English
        arrow-up
        22
        arrow-down
        3
        ·
        11 months ago

        I doubt it. The home network does not need to be secure. That is why you have VPNs and other such technology.

          • ngdev@lemmy.world
            link
            fedilink
            English
            arrow-up
            6
            arrow-down
            1
            ·
            11 months ago

            In those cases it’s justifiable to have to work in-person. I don’t think we’d want closed networks (presumably for stuff like nuclear power) exposed to the open internet.

            • ZoopZeZoop@lemmy.world
              link
              fedilink
              arrow-up
              6
              ·
              11 months ago

              True, but that won’t be most of the work force. There will always be exceptions for security/defense and some other areas. I suspect those areas already had a process for monitoring the comings and goings of staff and any off-site work. I also suspect the amount of off-site work was limited to begin with if it impacted security/defense.

          • atx_aquarian@lemmy.world
            link
            fedilink
            arrow-up
            3
            ·
            edit-2
            11 months ago

            Those networks are also not accessible from home networks, then. That is to say it’s a valid point regarding each industry and company having different constraints, but it’s not a concern over the security of home networks. If home/remote network security is ever the limiting concern, that can be mitigated by VPN.

            • couragethebravedog@lemmy.world
              link
              fedilink
              arrow-up
              1
              arrow-down
              2
              ·
              11 months ago

              The issue of using a work device outside of the office is if you ever connect it to your home network off of the VPN, then there is a chance the device is compromised. A malicious actor could have targeted you because they want to gain access to your company and they saw on your LinkedIn that you work remotely. So they simply use some OSINT to find your address, run a geo search on shodan and wiggle to identify your homes IP, then use that as an entry point to compromise your router and wait for your device to connect to continue the attack. This may sound complicated or a lot of work but this is actually quite simple to do and takes only 10 - 15 minutes.

        • couragethebravedog@lemmy.world
          link
          fedilink
          arrow-up
          3
          arrow-down
          3
          ·
          11 months ago

          It’s also about physical security, protecting access to your work laptop and protecting IP. That VPN is completely useless if someone can get into your home and access your device. It’s way easier to get into someone’s home than into a properly secured office.

          • TheCraiggers@lemmy.dbzer0.com
            link
            fedilink
            arrow-up
            1
            arrow-down
            1
            ·
            edit-2
            11 months ago

            That’s also why you encrypt your drives. The average enterprise figured out how to let somebody work from an airport long ago. It’s really not a huge deal.

      • malloc@lemmy.world
        link
        fedilink
        English
        arrow-up
        7
        arrow-down
        1
        ·
        11 months ago

        Ever hear of a VPN? This is pretty standard “security” for most Fortune 500s. Home network can be a Starbucks WiFi, but unless you have the decryption keys you are not going to be able to intercept the traffic tunneled through a VPN.

        • couragethebravedog@lemmy.world
          link
          fedilink
          arrow-up
          3
          ·
          11 months ago

          It’s not just network security though, that was just one example I used. Another is protecting company IP. They could be working from home and a neighbor peek through the window and see what you’re working on. Also that VPN isn’t worth a damn if someone can get into your home and gain physical access to your device. Sure they could also break into an office, but offices usually have a security system with alarms, cameras, and sensors. They also usually have stronger doors and locks. Security is absolutely a valid reason to return to the office. I work in cybersecurity for the record and this is an actual reason being pushed for a return to the office.

          • malloc@lemmy.world
            link
            fedilink
            English
            arrow-up
            2
            arrow-down
            1
            ·
            11 months ago

            They could be working from home and a neighbor peek through the window and see what you’re working on.

            This is a joke, right? RTO won’t stop this “attack” either. Since we are looking at extreme situations, what’s to stop an attacker from using a high powered scope and peek at an executives computer? In an office environment you have plenty of targets to choose from and exfiltrate information.

            Also, this is easily defeated by privacy screens. So this is a non-issue.

            Also that VPN isn’t worth a damn if someone can get into your home and gain physical access to your device

            You are right. Which is why multiple layers of defense is needed. VPN is just one layer, albeit a very poor “security by obscuration”

            Ways to combat this is have data encrypted at rest, and in transit. Modern computers/OS have the ability to encrypt all data at rest. If computer is stolen, attacker can’t do much without the decryption keys. Also, thin clients (VDIs) can be used to further reduce chance of compromise of physical device. Data does not leave the secure data center of the firm.

            Also, having applications / endpoints secured by MFA will help in reducing possible infiltration.

            The only attack vector I can think of that will defeat these measures is a person held with a gun pointed to their head but this is why having multiple persons to confirm an action will help reduce the impact of one person.

            but offices usually have a security system with alarms, cameras, and sensors

            All easily defeated and poor security measures with the right motivation.

            usually have stronger doors and locks

            This is poor security as well. Perhaps even security theater. Unless the doors are bank vault level lol

            None of the points you have given are valid in this digital age. A forced RTO is pointless.

      • TipRing@lemmy.world
        link
        fedilink
        arrow-up
        4
        ·
        11 months ago

        If you use vdi that runs on a corporate thin client security is basically a non-issue. Data never leaves the data center and so long as you harden the thin client it should be difficult to breach it.

        • couragethebravedog@lemmy.world
          link
          fedilink
          arrow-up
          2
          arrow-down
          2
          ·
          11 months ago

          It’s also about physical security, protecting access to your work laptop and protecting IP. That VPN is completely useless if someone can get into your home and access your device. It’s way easier to get into someone’s home than into a properly secured office.

          • TipRing@lemmy.world
            link
            fedilink
            arrow-up
            4
            ·
            11 months ago

            Right… that’s why you would use a VDI. There’s nothing local except a thin client that runs your citrix/vmware/whatever client. There’s a reason that VDI is generally used for PCI-compliant business cases but VPN is not.

      • Kangie@lemmy.srcfiles.zip
        link
        fedilink
        arrow-up
        5
        arrow-down
        1
        ·
        11 months ago

        Having implemented this sort of stuff for the mind if companies you probably think of when you’re thinking of enterprise… You’re making a mountain out of a molehill.

        The use of a VPN to secure data in transit and the use of strong encryption on the device, endpoint protection and management features, along with good password security make it easy for any organisation not dealing with literal SECRET or TOP SECRET information to enable remote with.

    • mycroft@lemmy.world
      link
      fedilink
      arrow-up
      11
      ·
      11 months ago

      There’s a really simple one. All the VCs and funders have been double dipping in REIT and in business real estate holdings. They sit on the boards of companies with no interest in maintaining offices, but have financial backers who veto those decisions.

      The language and excuses are all a smoke screen, it’s to give them time to get out of commercial real estate without crashing the market.

      Just before the pandemic the LARGEST commercial leases EVER were being signed in SFO and NYC… those same interests are just one giant ouroboros of funding and they saw their margins dwindling in their real holdings.

      Blackrock is the most obvious, but there are lots of board level holdings in the same situation, they’re of course going to advise and demand that the commercial real estate be maintained… They may even be able to get a discount on next lease… just gotta be nice and keep paying those bills!

    • malloc@lemmy.world
      link
      fedilink
      English
      arrow-up
      5
      arrow-down
      1
      ·
      11 months ago

      I’m okay with people returning to office. But forcing it down people’s throats when remote working has been working for the past few years is NOT okay. Fuck these out of touch companies and executives. I would rather quit than bend to their bullshit.