Skip to content

The new version of NACVIEW 2.3.18 is now available!

A new version of the NACVIEW system is now available. Version 2.3.18 introduces many expected fixes and improvements.

One of them is the changed mechanism for upgrading the system to a newer version.

ATTENTION!

Before upgrading NACVIEW to the new version 2.3.18, for each node of the NACVIEW system from the CLI level, select option 7 – NACVIEW update installer.

NACVIEW VM Appliance

NACVIEW VM Appliance

Then the system node must be restarted.

After restarting, the update process can continue normally:

https://docs.nacview.com/en/Step-by-Step/System-update

If you have policies for wireless networks created in the system, before upgrading NACVIEW to version 2.3.18, make sure that such rules are explicitly described in the access policies as relating to wireless networks. If any rules are not configured this way before the upgrade, they may stop working. More information can be found here:

https://community.nacview.com/d/105-set-the-network-type-in-access-policies-before-upgrading

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NACVIEW
A powerful network access control (NAC) solution designed to provide organizations with comprehensive visibility and control over their network infrastructure. Developed by leading network security company, NACVIEW offers advanced features and capabilities to ensure secure and efficient network access for users and devices.

Integration with Stormshield

Integration between security systems is crucial in providing ZTNA (Zero Trust Network Access). It improves customer company network resilience by providing centralized monitoring, streamlined workflows, improved threat detection, faster incident response, enhanced scalability and flexibility.

That is why one of the parts of developing the NACVIEW system is to empower it with the ability to integrate with solutions used by our current and future customers.

Tests with Stormshield firewall proved that there are many possibilities of integration:

One-Time Password (OTP) Authentication for VPN connections (Stormshield VPN Client)

To enable it Stormshield must be configured in NACVIEW as a network device. The second condition is that the user has the Stormshield VPN Client. The first stage of verifying the user’s identity is checking his credentials in the local NACVIEW database or an external one, e.g. Active Directory. If the login and password are correct, the account is active and the resource is properly configured, the second stage of validation takes place. NACVIEW sends the user an SMS with a verification code, or the code from the NACVIEW Google Authenticator or Google Authenticator app is used which must be entered into the Stormshield VPN Client. After correct verification of the code and its validity, access to specific network resources is granted.

Automatic response for incident alerts received from Stormshield.

To enable it syslog sending must be configured between Stormshield (sender) and NACVIEW (receiver) and rules (events definitions) must be configured. That integration enables organizations to detect and mitigate security threats more effectively and maintain a secure network environment. Potentially dangerous devices could be easily traced in the company network and afterward, quarantine those devices and alert notifications to the security administrator or the Security Operations Center (SOC) personnel, providing them with real-time information about the detected threat.

Stormshield can also issue a “rating” for a given computer/user, and integration via API empowers NACVIEW to quarantine noncompliant devices based on their rating.

If you would like to test more possible integration, write to us on https://community.nacview.com/

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NACVIEW
A powerful network access control (NAC) solution designed to provide organizations with comprehensive visibility and control over their network infrastructure. Developed by leading network security company, NACVIEW offers advanced features and capabilities to ensure secure and efficient network access for users and devices.

NACVIEW Integration with MICROSENS switches

NAC – Network Access Control solutions rely on switch functionality to enforce access policies in the company network. When a device connects to a switch port, the switch communicates with the NAC system to determine whether the device is compliant with security policies. This is why switches play a crucial role in the NAC implementation in the customer environment. Among the required switch functionalities is the support of authentication mechanisms such as IEEE 802.1X and MAB (MAC Authentication Bypass) to provide access enforcement, as well as support of SNMP, and SSH to provide real-time monitoring. 

Over the last few years, NACVIEW has been implemented in almost every industry. It allowed us to cooperate with a wide range of network devices’ suppliers. As an independent NAC vendor (not a manufacturer of a specific brand), we put a great effort into providing our customers with freedom of choice by letting them decide which switches best suit their needs and by creating integration and smooth support for all possible brands.

Recent implementations on the German market allowed us to configure NACVIEW with MICROSENS switches. MICROSENS is a popular supplier operating in four business areas: Enterprise Networks, Industrial Solutions, Optical Transmission, and Smart Building Solutions.

An example MICROSENS switch configuration can be found in the NACVIEW documentation at: https://docs.nacview.com/en/Device-Configuration/Microsens/Microsens-G6

If you are looking for a switch configuration, please contact our support team or start a discussion on the NACVIEW Community.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NACVIEW
A powerful network access control (NAC) solution designed to provide organizations with comprehensive visibility and control over their network infrastructure. Developed by leading network security company, NACVIEW offers advanced features and capabilities to ensure secure and efficient network access for users and devices.

NordLayer feature release: IP-based split tunneling

At NordLayer, we understand the need for network flexibility, and we’re excited to introduce our latest innovation: IP-based split tunneling. This new release is a major advancement, building upon our URL-based split tunneling feature and opening new doors for our customers’ network security and performance.

With IP-based split tunneling, we’re introducing a more tailored approach to network traffic management. This sophisticated method allows organizations to selectively encrypt network traffic by specifying IP addresses or subnets, ensuring sensitive data transmitted to and from those addresses remains secure and private. By separating encrypted and unencrypted traffic, we help organizations strike a delicate balance between robust security measures and uninterrupted internet performance.

What problem does IP-based split tunneling solve?

IT administrators often face the challenge of balancing network security with optimal performance. NordLayer’s IP-based split tunneling solves this dilemma by enabling selective encryption of traffic for specific IP addresses or subnets.

Click to tweet

Additionally, IP-based split tunneling addresses the issue of managing organization-based network requirements. With the ability to exclusively encrypt traffic, admins can tailor network security to meet changing needs—such as a growing organization or industry-specific compliance requirements—ensuring that critical resources are protected while adapting to dynamic organizational demands.

Pair IP-based split tunneling with granular access control rules enforced through NordLayer Cloud Firewall and you have yourself an unprecedented private resource access solution that meets everchanging business needs.

Feature characteristics: what to expect

IP-based split tunneling brings benefits to IT admins and end-users alike. Admins gain centralized control and improved network management capabilities, while employees experience seamless internet performance.

The key advantages of IP-based split tunneling revolve around enhanced productivity and performance:

  • Optimized internet performance: By selectively routing only specific subnets through the VPN tunnel, organizations can alleviate bandwidth limitations and bottlenecks. Regular internet traffic doesn’t need to be tunneled through the NordLayer gateway, resulting in improved overall network performance.

  • Enhanced VPN performance: With split tunneling enabled, employees can effortlessly access company resources and regular internet services, printers, and other local network devices alike, remaining unaware of the underlying security configurations.

  • Flexibility & control: By excluding non-essential traffic from the VPN tunnel, organizations can achieve better performance for applications and services that don’t require encryption, such as SaaS or VoIP services from globally trusted providers.

  • Security & risk mitigation: IP-based split tunneling enables organizations to balance security and functionality by directing critical internal systems through a VPN and allowing less sensitive web browsing traffic to bypass encryption while keeping the protective layer on through the use of NordLayer’s Secure Internet Access features.

How does IP-based split tunneling work?

IP-based split tunneling is a strategic feature that selectively secures parts of your network traffic. IT administrators can configure specific IP addresses or subnets for encryption, ensuring that only those specified addresses are routed through secure VPN servers.

Click to tweet

This targeted encryption approach strikes the perfect balance between security and performance—your sensitive data remains protected without any impact on the speed of web browsing.

Each dedicated server can be configured with up to 16 CIDRs at a time and there is no limit to how many servers can be used in a single Virtual Private Gateway.

Configuring split tunneling is straightforward and accessible with our Core and Premium subscription plans. This feature is particularly useful for Premium subscribers who can use the Site-to-Site capability to access private network subnets through the NordLayer gateway.

To enable this feature, follow these simple steps:

  1. Navigate to the Network section in the NordLayer’s Control Panel

  2. Select Servers and then choose Configure from the options presented

  3. From the dropdown menu, select Split Tunneling

  4. Input the desired IP addresses and subnets you wish to tunnel through NordLayer

By specifying these addresses, you ensure that only the designated traffic uses the NordLayer tunnel, while other traffic utilizes the direct internet route.

Productivity by design

Our first release, URL-based split tunneling for Browser Extension, offered flexibility by leaving certain domains unencrypted while encrypting the rest of the traffic. Now, with IP-based split tunneling for desktop and mobile apps, we’re taking it a step further, allowing organizations to pinpoint exactly which IP addresses require encryption.

The beauty of our twofold approach lies in the different strategies employed. URL-based split tunneling creates exceptions by excluding specific domains, while IP-based split tunneling includes only specified IP addresses for a more targeted encryption process. Together, they form the foundation of our VPN split tunneling feature, enhancing network efficiency, reducing congestion, and optimizing bandwidth usage.

We understand that network security can be complex, and our goal is to provide organizations with the tools they need to navigate it with confidence. Our innovative duo of URL-based and IP-based split tunneling increases flexibility, allowing our customers to customize their network security according to their needs.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Armor your Achilles’ heel. Reduce your business’ attack surface vectoring from employee mobile devices

The number of Android threats detected by ESET telemetry in the past four years has tripled. 

Trojanized chat apps, software development kits turning legitimate apps into spyware, or fake websites offering malicious mobile applications — these are just a handful of the growing number of threats targeting smartphone users in the past few months discovered and analyzed by ESET researchers.

While these threats may sound like the personal problems of private individuals using their own devices, various surveys show that smartphone equipped rank-and-file employees are in fact yet another attack surface for businesses, one that should be prioritized. 

And that’s not easy. Even with thorough cyber-awareness training, there is still a good chance that an employee will fall victim to a sophisticated attack and become the Achilles’ heel in an otherwise first-rate defense of their respective business.

Being aware of this, ESET has introduced a new Mobile Threat Defense module to its comprehensive business solution ESET PROTECT, with sweet pricing available for the Advanced tier and higher. Users of ESET PROTECT Advanced and higher can enjoy one free mobile device seat per one paid seat for other devices. 

Growing numbers

To understand the scope of the problem, let’s review some key data from ESET telemetry. From the beginning of 2020 until the end of 2023, detections of Android malware rose by 222%. ESET Threat Reports provide further insight as to why this number has more than tripled in just four years.

In 2021, ESET telemetry detected a 428% annual increase in Android banking malware. The following year, the overall increase was driven by adware. And 2023 saw a significant increase in Android spyware cases.

If you are asking what it means for your business, check out the results of the surveys discussed below. 

A 2022 survey of working adults and IT security professionals from across the world revealed that half of the respondents used their employer-issued devices to check personal emails and messages. A further 45% used their work devices for reading news stories, while 32% shopped online.

Ironically, emails, online shops, and even news portals were the precise attack vectors described in several pieces of ESET research in 2023.

When it comes to employees using their own devices, 48% of organizations deploying a Bring Your Own Device (BYOD) policy witnessed malware being introduced through an employee’s personal phone, according to a Samsung 2023 survey.

If you wonder what’s behind these compromises, another 2022 survey found that the most common mistake contributing to cyber incidents is employees’ poor password hygiene and misuse of personal email.

Real-life examples

Maybe those numbers are too general, so let’s see some real examples of how a malicious app installed on an employee’s smartphone can endanger the whole company.

Last year, ESET researchers published a blog about two campaigns targeting Android users that had been active since July 2020 and July 2022, respectively, and were distributed across several app stores and dedicated websites. 

The threat actors in question patched open-source Signal and Telegram apps for Android OS with malicious code that ESET researchers later identified as BadBazaar. These malicious apps went by the name Signal Plus Messenger and FlyGram, and their purpose was to exfiltrate user data, such as contacts, call logs, and the users’ list of Google accounts.

The Signal Plus Messenger app proved even more dangerous than FlyGram with its unique capability to spy on the victim’s communications in the legitimate Signal app, an app that is often praised for its reliability and that is trusted by high-value targets, such as journalists.

However, after installing Signal Plus Messenger, threat actors were able to connect the compromised device to the attacker’s (Signal equipped) device and read its messages. Such sensitive information could be used in further spear phishing attacks against business officials.

A similar case was covered in June 2023, when ESET researchers published research on Android GravityRAT spyware. This malware was distributed within the malicious but functional messaging apps BingeChat and Chatico — both based on the OMEMO Instant Messenger app. The spyware can exfiltrate call logs, contacts, SMS messages, the device location, basic device information, and files with specific extensions, such as jpg, PNG, txt, pdf, etc.

If your company has a BYOD policy, taking an interest in Android malware, the threat behind the 89% increase in ESET telemetry detections in the second half of 2023 is a must. This increase was primarily due to a mobile marketing software development kit (SDK) that ESET identifies as SpinOk Spyware.

This SDK was offered as a gaming platform and was incorporated into numerous legitimate Android applications, including many available on official app marketplaces. Once an app with the aforementioned SpinOK SDK is installed, it operates like spyware, connecting to a command-and-control server and extracting a range of data from the device, including potentially sensitive clipboard (short-term storage) contents.

Again, this attack can impact employees who might “Game” on their smartphones, gathering sensitive data that can later be used against their company.

Other attacks

So far, we have been describing spyware detected by ESET researchers during past year, but there are also other threats to business coming from mobile devices. 

  • Other malicious apps – Not all malicious apps are spyware going after messages and files in a mobile device. Some of them, for example, try to lure victims into giving their bank account credentials or encrypt files in the victim’s device and ask for a ransom.
  • Phishing – Some of the biggest data breaches in history started with one employee falling for a phishing message, giving credentials, and letting cybercriminals enter the company’s network. 
  • Physical theft – Physical theft or loss of a corporate mobile device could be a serious cyber incident, especially if the smartphone or tablet contains sensitive information and is locked by a weak password. And such things happen often. In London alone, 90,864 phones were stolen in 2022. 
  • Vulnerabilities – If you think that you are safe with using only standard cloud-based team communications platforms such as Microsoft Teams or Slack, think twice. Vulnerabilities and bugs that can lead to a data breach don’t spare even the biggest names on the market.
  • Worms – Because laptops and smartphones use different operating systems, it is rare to see one malware that spreads and executes in different environments. However, there have been cases such as the Hamweq.A worm, which used smartphones as carriers to spread malware into Windows PCs via the USB cable.

Valuable targets

Most employees probably don’t use their mobile devices for accounting, coding, or administrative duties, but previously mentioned real-life cases clearly show that they are valuable targets for cybercriminals nonetheless. This makes them a potential liability to a business’s cyberdefenses.

This is why having complex, multilayered protection of your mobile devices within a unified cybersecurity platform is so important. If you want to protect that Achilles’ heel and are interested in ESET solutions for companies and their mobile devices, click here

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

How Ransomware Impacts Government Organizations

Government institutions provide critical services to citizens, including healthcare, public safety, transportation, and utilities and as such are prime targets for ransomware attacks. Ransomware attacks can disrupt these services, causing delays, shutdowns, and potentially putting lives at risk. In some cases, ransomware attacks on government institutions may have broader national security implications. For example, if critical infrastructure or sensitive government systems are compromised, it could impact national defense, intelligence operations, and diplomatic relations.

What is Ransomware?

Before we look at the impact of ransomware of government organizations, lets define what ransomware is. Ransomware is a type of malware that holds the victim’s data or device hostage until the ransom is paid. However, once the ransom is paid there is no guaranty that the files will be returned. An increasing trend is to use a double extortion tactic, where an organization is asked to pay a second ransom to prevent exfiltrated data from being publicly leaked or sold to other criminal enterprises.

Ransomware attacks can be carried out through phishing emails, malicious downloads, or exploiting vulnerabilities in software. Preventative solutions and measures such as IT security awareness training go some way to reducing the threat, but ransomware is now the number one cryptocurrency crime.

Impact of Ransomware on Government Organizations

Ransomware attacks on government institutions have increased significantly making them a tier 1 national security threat that affects, schools, local authorities, hospitals and even the military. Due to the high value of data held by government organizations and the disruption that attacks can cause, it puts them at the very forefront of the ransomware threat.

A ransomware attack can not only disrupt public services such as water and electricity, but can cause significant and wide spread damage across all departments including public pensions, organising land searches for people wanting to move house, delays in the judicial system, waste pickup, impacted military operations, cancelled medical procedures and a host of other essential everyday services we rely on.

As well as the disruption that ransomware attacks cause, the resulting loss of data can result in severe financial setbacks and legislative fines. In many cases, the attackers threaten to publicly release the stolen information if the ransom is not paid, and there is no guarantee that the attackers will provide the decryption key even if the ransom is paid. This leaves the institution with no choice but to rebuild their systems and data from scratch which is a considerable investment in both time and money.

Steps to Protect Government Organizations from Ransomware

Given the significant impact that ransomware attacks can have on government organizations, it is crucial to take steps to prevent these attacks. Here are a few steps that organizations can take to protect themselves:

1. Implement robust cybersecurity measures:
Government organizations should implement robust cybersecurity measures, such as firewalls, intrusion detection systems, and anti-malware software. Regularly updating software and operating systems can also help reduce the risk of attacks.

2. Conduct regular employee training:
Regular training for employees can help reduce the risk of successful phishing attacks, which are a common method of ransomware delivery.

3. Regularly backup data:
Regularly backing up critical data and storing backups in a secure location can help ensure that data is recoverable in the event of a ransomware attack.

4. Implement multi-factor authentication:
Multi-factor authentication can help reduce the risk of unauthorized access to systems and data, even if credentials are stolen.

5. Develop an incident response plan:
Developing an incident response plan can help organizations respond to a ransomware attack quickly and effectively, minimizing the impact on the organization. A ransomware containment solution is a critical component of such a plan.

Learn More

BullWall offers a ransomware penetration test to help you assess how your current tools respond to various ransomware variants. Or you can schedule a demo of our containment solution.

About Bullwall
BullWall is a fast-growing international cybersecurity solution provider with a dedicated focus on protecting critical data during active ransomware attacks. We are the only security solution able to contain both known and unknown ransomware variants in seconds, preventing encryption and exfiltration across all data storage types.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Best remote work books for business in 2024

Remote work is here to stay. However, companies need to ensure remote workers can connect safely and efficiently. Balancing convenience, employee freedom, and data security takes skill and judgment. And it also requires a little creativity to support remote workers while meeting business goals.

If you are grappling with remote work challenges, this blog is for you. We will explore some of the most accessible and informative remote work books. There are plenty of entertaining experts around (and a few imposters). But the books below are all essential additions to your management bookshelf.

Benefits and challenges with remote working employees

Working from home is a fundamental part of modern life. As of 2024, around 33 million Americans work remotely. Virtually all workers would like the option of working remotely sometimes. And almost 30% of workers have adopted a “hybrid work” routine, mixing office time and work from home.

Employees are embracing remote work because they want to. Working from home allows staff to find the right work-life balance. Workers can balance childcare, leisure, and work. And they can forget about stressful commutes.

For companies, remote work boosts employee happiness and reduces the cost of on-premises systems. Home workers are often more productive (although not always), and companies can leverage national or international talent pools.

On the other hand, managing remote teams brings challenges. Managers need to communicate effectively and keep workers motivated. Building teams is tricky without face-to-face contact. And then there are security worries.

Remote work often requires exchanging sensitive data between central or cloud data centers and homes or public networks. Employees need third-party remote access to apps and databases. This access creates new and potentially harmful data risks.

None of these challenges are insurmountable. If they were, millions of employees would permanently return to the office, but that is not happening. Creative companies are finding ways to benefit from working from home without risking their reputations.

Successful firms also leverage expert advice and constantly expand their remote work knowledge. Head straight to the list below for our recommended reading, or check out these related articles to explore remote work further:

Related articles

 

Remote Work

Creating a successful remote work policy: examples and best practices

29 Aug 20236 min read

Creating a successful remote work policy web 1400x800

 

In Depth, Remote Work

Simplify remote employee onboarding with a complete checklist

8 Aug 20237 min read

Remote employee onboarding checklist web

 

Best books to read about remote work

Titles for remote work managers to dive into:

  • “The Ultimate Guide to Remote Work”

  • “Remote: Office Not Required”

  • “Remote Work: Redesign Processes, Practices and Strategies to Engage a Remote Workforce”

  • “Running Remote: Master the Lessons from the World’s Most Successful Remote-Work Pioneers”

  • “Remote Not Distant: Design a Company Culture That Will Help You Thrive in a Hybrid Workplace”

  • “Office Optional: How to Build a Connected Culture with Virtual Teams”

  • “Leading From Anywhere: The Essential Guide to Managing Remote Teams”

  • “Work Together Anywhere: A Handbook on Working Remotely Successfully”

  • “The Nowhere Office: Reinventing Work and the Workplace of the Future”

  • “Remote Leadership: How to Accelerate Achievement and Create a Community in a Work-from-Home World”

  • “How the Future Works: Leading Flexible Teams to Do The Best Work of Their Lives”

  • “Remote Work Revolution: Succeeding from Anywhere”

  • “HBR Guide to Remote Work”

  • “Virtual Culture: The Way We Work Doesn’t Work Anymore, a Manifesto”

  • “Deep Work”

  • “The Nowhere Office: Reinventing Work and the Workplace of the Future”

That list should occupy even the most voracious readers. So, let’s turn the page and introduce 2024’s best remote work books.

“The Ultimate Guide to Remote Work” by Wade Foster, Alison Groves, and Danny Schreiber

The Ultimate Guide to Remote Work

Billing itself as the “ultimate guide” sets expectations high for this Zapier App publication, but the authors deliver. Based on the real-world experiences of Zapier CEO Wade Foster and his team, the book discusses practical struggles and solutions. Always avoiding jargon, it explains how to build remote teams and make them run smoothly.

Check for the latest Kindle version of the eBook, as the authors update the text frequently. Regular updates mean that few books are as fresh and relevant.

“Remote: Office Not Required”  by Jason Fried and David Heinemeier Hansson

Remote: Office Not Required

First published in 2013, “Office Not Required” set the trend for remote working manuals. Ten years later, it remains relevant and inspirational.

Fried and Hansson used their experiences as founders of project management start-up Basecamp. What makes their argument persuasive is the process Basecamp followed, moving from assumptions about on-premises work to embracing remote alternatives.

Although written from a CEO perspective, the book is equally valid for workers, so anyone can benefit from it.

“Remote Work: Redesign Processes, Practices and Strategies to Engage a Remote Workforce” by Chris Dyer and Kim Shepherd

Remote Work Redesign Processes, Practices and Strategies

Moving to remote work is a business process requiring systematic planning and skill. Dyer and Shepherd know the task inside-out, having shifted their teams to home working during the Covid pandemic.

This book is ideal for managers seeking to structure remote work transitions. For instance, Dyer and Shepherd discuss writing remote work policies and using digital tools to secure workstations. They also discuss HR and management strategies to support employees and delve into measurement techniques to verify remote work productivity. Managers will find it an invaluable companion.

“Running Remote: Master the Lessons from the World’s Most Successful Remote-Work Pioneers”  by Liam Martin and Rob Rawson

Running Remote

Rawson and Martin founded Time Doctor to help workers with time management. However, Time Doctor encountered problems when transitioning to a remote model. “Running Remote” chronicles the experience, adding advice about how to leverage remote workforce technologies. Honest and very readable, it makes a convincing case for going remote. But it also adds context about dangers and challenges.

One of the best aspects of this book is what the authors call the “async mindset.” Stripping away the jargon, this is a valuable framework for managing remote staff and ditching old-style meetings or management techniques.

“Remote Not Distant: Design a Company Culture That Will Help You Thrive in a Hybrid Workplace” by Gustavo Razzetti

Remote Not Distant

As Razzetti observes, one of the best things about remote work is that it separates employees from static offices, allowing them to work wherever they want. However, one of the drawbacks of remote work is the distance between workers and managers. Solving this problem is tricky – at least without the advice contained in this fascinating book.

Easy to read but well-informed, Razzetti’s book explains how to mold remote work mindsets and manage distributed teams. He explores ways to build a remote corporate culture and collaborate seamlessly across continents. In other words, there’s plenty of gold here for managers to discover.

“Office Optional: How to Build a Connected Culture with Virtual Teams” by  Larry English

Office Optional

Larry English blazed a trail in remote work, helping to build one of the first remote-first consultancy firms. He also timed this book perfectly to coincide with the Covid pandemic. More importantly, he filled this primer with invaluable stats and management wisdom.

Readers can glean a lot of insights from “Office Optional”. Some of the most memorable sections deal with building trust across the oceans and maintaining close professional relationships with colleagues you barely ever meet. As English stresses, relationships are everything in remote work. But with the right mindset and skills, a remote leader can unify and inspire even the most dispersed team.

Leading From Anywhere: The Essential Guide to Managing Remote Teams

Leading From Anywhere

Burkus has written the how-to manual for remote managers. “Leading from Anywhere” sets out critical tasks for smooth remote work. It covers employee onboarding, performance reviews, communication, preventing burnout, and building a healthy remote culture.

Burkus tackles each subject with a mixture of best practices and real-life testimonies. By the end of his book, you should be ready for whatever remote work transitions come your way.

“Work Together Anywhere: A Handbook on Working Remotely Successfully” by Lisette Sutherland and Kirsten Janene-Nelson

Work Together Anywhere

Sutherland is one of the most in-demand virtual team consultants, helping companies worldwide craft functional remote work setups. This book presents advice from the front line about what makes good remote teams and what causes teams to fail.

One of the best aspects of “Work Together Anywhere” is how it breaks down tasks and ideas by role. There are chapters for managers leading remote teams, employees, and even executives. Every stakeholder plays a part in remote work. Sutherland and Janene-Nelson explain what they need to do.

“The Nowhere Office: Reinventing Work and the Workplace of the Future” by Julia Hobsbawm

The Nowhere Office Reinventing Work and the Workplace

Hobsbawm is an experienced communications expert (and a popular podcaster on remote work topics). Her book, “The Nowhere Office,” distills her experiences advising companies about how to embrace hybrid work. Hobsbawm offers a positive vision of employee flexibility that complements corporate goals, provided companies know what they are doing.

Another strong point of “The Nowhere Office” is that it takes on critics of home working. For instance, Hobsbawm accepts that working from home can isolate workers or cause leadership headaches. She has plenty of convincing answers to those problems, along with almost every common argument against hybrid work.

We liked the book so much that we actually spoke to the author in late 2023. Check out the interview before ordering the eBook or paperback, as Hobsbawm delivers some insights that you won’t find in the text.

“Remote Leadership: How to Accelerate Achievement and Create a Community in a Work-from-Home World” by David Pachter

Remote Leadership

When the pandemic hit, marketing agency JumpCrew was still getting started. An intense face-to-face strategy and a close-knit office team had powered rapid growth. However, that had to change as the firm adopted remote working. As the CEO of JumpCrew, Pachter oversaw the transition. And with more than 200 employees at last count, he did pretty well.

“Remote Leadership” tells the story of adaptation under pressure. Pachter explains how a three-part model based on reflective leadership, collaborative learning, and peer coaching helped JumpCrew survive. He also argues persuasively that similar ideas can help remote teams thrive.

“How the Future Works: Leading Flexible Teams to Do The Best Work of Their Lives” by Brian Elliott and Sheela Subramanian

How the Future Works

Approved by the CEO of Slack, “How the Future Works” will inspire anyone who is half-convinced about the virtues of remote working. Elliott and Subramanian explore the benefits of flexibility for workers and companies.

Along the way, they make radical suggestions about the value of letting go – enabling teams to express their creativity without interfering. However, they ground this sense of freedom in hard-headed practical advice about managing remote teams. The result is a fusion of optimism and realism and a great explainer for remote work managers.

“Remote Work Revolution: Succeeding from Anywhere” by Tsedal Neeley

Remote Work Revolution

Written by a professor at Harvard Business School, this Financial Times & McKinsey Business Book Of The Year nominee is a must-read for remote work managers.

Unlike many remote work think pieces, Neeley’s work focuses on data security and technical challenges. Expect step-by-step guides to creating functional teams and plenty of case studies to bring the theory to life. The tone is academic (naturally) but not inaccessible at any stage.

“The HBR Guide to Remote Work” by Harvard Business Review staff

The HBR Guide to Remote Work

It may be a little dry in places, but HBR’s remote work guide is a must-have nonetheless. The reason is that this guide covers a lot of ground concisely but intelligently. Readers learn about setting up home offices, managing teams, ways to run virtual meetings, and choosing remote work technologies. There’s no better nuts and bolts guide to working remotely for bosses and employees alike.

“Virtual Culture: The Way We Work Doesn’t Work Anymore, a Manifesto” by Bryan Miles

Virtual Culture

Based on years of coaching teams, this short but engaging book urges managers to look beyond routines and old-style performance targets.

For Miles, remote working requires a complete change in company attitude. Effective teams are free and autonomous. And managers need to find ways to engage with colleagues without micro-managing their activities. That’s not easy, but “Virtual Culture” offers some handy pointers.

“Deep Work” by Cal Newport

Deep Work

Cal Newport’s modern classic dates back to 2016, but it anticipated the world of remote work in uncanny detail. And Newport’s expert insights are just as relevant as ever.

“Deep Work” argues that elite workers will dedicate their mind power and attention to critical tasks in the future. Trivial meetings won’t steal their time and attention. Instead, they might spend half a day meditating to prepare their minds for a few hours of productive work.

This kind of attitude fits perfectly with remote work. If you have not already done so, be sure to schedule a few hours with Newport soon.

Books for remote employees 

The transition to working from home or any remote location demands a new set of skills and adaptations—from creating an efficient workspace and maintaining ergonomics to mastering virtual communication and ensuring personal well-being. Whether you’re a seasoned remote worker or just starting, understanding the nuances of this evolving work culture is crucial for success. 

We’ve chosen a few books that can guide you to make the shift to remote work manageable and truly rewarding. Here is our list:

  • “The Year Without Pants: WordPress.com and the Future of Work”

  • “Remote, Inc.: How to Thrive at Work . . . Wherever You Are”

  • “Working From Home: Making the New Normal Work for You”

  • “Ready, Set, Remote!: The Fast Guide to Creating a Professional Home Office”

  • “Work from Home Ergonomics 101: Tips to Improve Your Comfort, Productivity, and Safety While Working Remotely”

“The Year Without Pants: WordPress.com and the Future of Work” by Scott Berkun

The Year Without Pants

Back in 2012, ex-Microsoft manager Berkun started working at Automattic (the parent company of hosting giant WordPress). And what he found was a revelation. Automattic pioneered flexible working. The firm has never fixed itself to a central office. Its employees famously barely send emails, let alone attend morning staff meetings.

“The Year Without Pants” is a highly entertaining document from the early years of remote work. It’s an essential read for employees who are toying with home working. But the book is also full of management nuggets (as well as being flat-out entertaining).

“Remote, Inc.: How to Thrive at Work . . . Wherever You Are” by Robert Pozen and Alexandra Samuel

Remote, Inc.

If you are intimidated by asking for more flexible work, this is the book to read. Pozen and Samuel highlight the many benefits of leaving the office behind and explore some common challenges individuals face when they work alone.

Chapters look at managing your time, communicating with managers, and making the most of online meetings. These skills don’t come naturally to everyone. But the techniques and tricks supplied by this book can make the adjustment easier.

“Working From Home: Making the New Normal Work for You” by Karen Mangia

Working From Home

Mangia writes from the standpoint of someone who has tried to work from home but struggled. Most of us can sympathize with her tales about claustrophobic home offices, uncomfortable chairs, and endless distractions. The darker side of remote working can often make life very tricky.

However, Mangia also devises remote work solutions. She discusses striking a healthy work-life balance, staying motivated, and remaining connected with colleagues—everyday tasks that all remote employees face.

“Ready, Set, Remote!: The Fast Guide to Creating a Professional Home Office” by Dave Allen

Ready, Set, Remote

Most remote employees are not interior designers, and not all home spaces transform smoothly into offices. Dave Allen’s practical guide will be gold dust for anyone converting a corner of your home into a productivity center. He keeps things down-to-earth and concise, and his cybersecurity reminders are particularly valuable.

“Work from Home Ergonomics 101: Tips to Improve Your Comfort, Productivity, and Safety While Working Remotely” by Morgan Sutherland

Work from Home Ergonomics 101

Back or joint pain can ruin your remote work experience. Poorly designed workspaces can cause a host of physical problems. Morgan Sutherland’s book explains how to apply ergonomic principles to a remote work environment. He draws on extensive physio experience to clarify posture, seating, screen alignment, and destressing techniques. Everyone should read it before ditching the office.

Beyond books: Smart thinking for securing remote workers

Remote work brings many challenges. Home workers often face issues with communication, team building, work-life balance, and staying motivated.

Cultural and organizational questions are critically important. However, remote workers also need to contend with technical matters like cybersecurity and ensuring confidentiality. Books can assist, but solving those problems requires specialist help.

Employees need additional training about handling data at home and connecting safely to central networks. Companies should also extend security tools to remote workers, supplying authentication systems, VPN clients, and malware prevention tools.

Securing remote workers internally can succeed. However, using security partners with remote work experience is often preferable.

NordLayer’s solutions are a case in point. Companies can create flexible network perimeters. Remote Access VPN and access management tools cover remote devices, ensuring only authorized users can access network resources. Flexible tools allow BYOD for office days, while cloud integrations enable remote workers to access assets they need.

Brush up on your knowledge with 2024’s best remote work books. If you need assistance, feel free to get in touch. NordLayer will help you find the perfect remote work solution.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Europeans face evolving cyberthreats. Defense strategies need to be robust and pragmatic

Guest speaker, Forrester Sr. analyst Tope Olufon explains how to stay resilient in Europe’s fluid threat landscape.

Cybersecurity is a complicated and constantly changing endeavor requiring robust security solutions and services such as cyber threat intelligence, automated incident response, and managed detection and response (MDR). But having all of these is not enough, according to Tope Olufon, senior analyst at Forrester, a leading global market research company.

At the ESET WORLD 2024 conference, Mr. Olufon also highlighted the importance of threat actor motives and the specific context in which cybersecurity solutions are deployed. He also kindly answered a few of ESET’s questions afterward.

Considering the fluid threat landscape together with cybersecurity context, it is not possible to say what the best product is or how, for example, a good threat intelligence report should look, according to Mr. Olufon.

“No matter, how you slice and dice a threat intelligence report, what matters the most in the end is what it means for you, how can you use this and how this is going to make you more secure tomorrow, next week, or next year,” Mr. Olufon said.

Today’s threat landscape

Currently, the two most commonly reported attack methods are software supply chain breaches and software vulnerabilities, as organizations hit by those attacks tend to have noisy and opaque system environments, according to Forrester. 

This means that companies still struggle to achieve good visibility of their IT assets and are flooded by numerous false positive detections.  “The visibility needed to define your organizational needs and to set a context for cybersecurity investments is missing,” Mr. Olufon said.

Here are biggest information/IT security challenges noticed by Forrester:

  • Receiving too many false positive detection alerts
  • Lack of comprehensive IT asset visibility
  • Complexity of IT environment
  • Inability to measure the effectiveness of a security program
  • Receiving too many detection alerts

Besides these internal challenges, organizations need to also adapt to current external trends: Geopolitics are a lot more significant, since previously “insulated” sectors such as health care are now prime targets for threat actors, and the global skills gap means that things will get worse.

“It is an asymmetric playing field,” Mr. Olufon said, stressing that it doesn’t mean that those more vulnerable organizations are hopeless. “While there are, of course, some constraints, those organizations can start from somewhere. Organizations can start with creating an asset inventory, identifying what they have. The only way to eat an elephant is one fork at a time and that’s how you approach cybersecurity regardless of industry.”

Another thing that organizations need to consider is threat actors’ motivation. There are threat groups that go only for their targets’ money, but others want to stir political instability, or disrupt critical infrastructure.

To understand the current threat landscape and be prepared for upcoming threats, organizations should utilize cyber threat intelligence. However, many of them struggle to incorporate the compiled information into their security programs.

“In those organizations, the threat intelligence is something you pay for and show to the board at quarterly meetings. ‘We noticed 1000 samples of this attack,’ that doesn’t really mean anything,” Mr. Olufon said.

Therefore, threat intelligence needs to be contextualized and the right stakeholders need to be identified.

Responding to incidents

Despite cybersecurity companies investing a lot into prevention, organizations need to anticipate that something bad is going to happen. Therefore, incident response (IR) capabilities are a key part of cyber defenses.

Successful incident response means that a threat is mitigated quickly, and a targeted company doesn’t lose money or customers. But this is easier said than done. Currently, organizations face several challenges when utilizing proper IR:

  • Risks grow exponentially, but resources do not. Talent and tooling need to constantly evolve.
  • Data sovereignty requirements make data collection and storage a complex issue because local data residence requirements could make organizations’ capabilities constrained. 
  • Evolving privacy requirements introduce new complexities to employee activity monitoring as privacy requirements in some countries make data collection difficult.
  • Threat intelligence feeds are poorly integrated. Threat-hunting efforts are also rudimentary. 

And all this sheds light on the importance of MDR. Its essential component is Endpoint Detection and Response (EDR) which brings to the table the ability to respond to an incident both while it is still occurring and immediately after. Other important MDR components are threat-hunting capabilities.

“Human-driven threat hunting capabilities to be precise. Because what we have seen in the market is a lot of vendors saying that they have AI-driven threat hunting. But that is not sufficient, as AI is still just an enabler” Mr. Olufon said.

Finally, MDR should utilize automation because threat actors are very good at automation too, and MDR should help achieve a balance of powers.

But again, context is important. An MDR provider should also be able to bring contextual recommendations to improve an organization’s security posture. For example, by helping them to not only identify vulnerabilities but also smaller mistakes that lead to cracks in defenses.

Securing the future

All of this is good for today, but organizations need to look to the future and anticipate what is going to happen over the next months and years.

We can already see concepts like edge intelligence, TuringBots, or extended reality and organizations certainly don’t want to fall behind threat actors when they start to utilize these new technologies.

Let’s take cloud computing as an example: “A lot of companies still don’t have a cloud security strategy, but we have had cloud since 2006 and IT teams have been leveraging the cloud since then. Security teams started to take it seriously in 2016, ten years later, while still trying to treat the cloud as an emerging tech. It doesn’t really work that way,” Mr. Olufon said.

Conclusion

To sum up, the adversaries’ motivation and their capabilities are evolving, they are very good in automation and finding vulnerabilities in their targets’ systems. On the other hand, organizations often struggle with deploying automated cybersecurity solutions and don’t have a good visibility into their systems.

Especially, in case of more vulnerable organizations such as healthcare or charity organizations, all these challenges make cyber environment rather asymmetric. That is why organizations need to be smart about how they plan their defense strategies, how they adjust their budget, and how to make the most out of cybersecurity solutions they deployed.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Keepit receives third consecutive Customer Top Rated Award from TrustRadius

Keepit has been recognized as a leader among SaaS Backup, Data Loss Prevention, Disaster Recovery, and Enterprise Backup categories.

Copenhagen, Denmark – May 10 Keepit, a global leader in SaaS data backup and recovery, today announced that it has been recognized as TrustRadius Top Rated in four categories: SaaS Backup, Data Loss Prevention, Disaster Recovery and Enterprise Backup. This recognition comes directly from customers, underscoring Keepit’s commitment to providing an effortless and secure backup and recovery platform.

“Keepit earning a TrustRadius Top Rated award is a testament to the overwhelmingly positive feedback captured in their customer reviews. This recognition highlights Keepit’s commitment to delivering exceptional cloud data protection solutions. We congratulate Keepit on this well-deserved honor and commend them for their dedication to exceeding customer expectations, empowering businesses, and providing outstanding data protection services”, says Allyson Havener, SVP of Marketing & Community, TrustRadius.

Since 2016, the TrustRadius Top Rated Awards have become the B2B’s industry standard for unbiased recognition of excellent technology products. Based entirely on customer feedback, they have never been influenced by analyst opinion or status as a TrustRadius customer. Here is a detailed criteria breakdown of the methodology and scoring that TrustRadius uses to determine Top Rated winners.

“For Keepit, this is one of the most valuable categories of awards we can receive,” says Michele Hayes, CMO at Keepit. “An award based on customer praise reinforces that Keepit is delivering on its promise to support our customers globally with leading backup services characterized by security, efficiency and simplicity.”

 

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

Stress-free travel with Nord Security’s new eSIM – Saily

Picture the scene: After a long flight, you arrive in a distant land. Dragging your suitcase through the airport terminal, you notice the long lines at the SIM card booths. It might be a while before you can explore the city. There’s got to be a better way, you think… 

After months of behind-the-scenes development, Nord Security unveiled Saily, a new eSIM product designed with travelers and explorers in mind. We’re bringing our expertise in user-friendly, powerful cybersecurity tools to an everyday product that simplifies travel, reduces environmental impact, and avoids unexpected roaming costs for our customers. 

So let’s explore the what and why of Saily:

What are SIMs?

  • SIM is an acronym for Subscriber Identity Module, a key part in mobile devices that identifies and authenticates users.

  • The traditional SIM card is a microprocessor chip on a removable plastic card placed inside the phone.

  • SIM cards are preprogrammed and distributed by phone plan carriers to identify customers and allow them to connect to the mobile network.

  • If a customer changes carriers, they have to swap out SIMs manually.

What are eSIMs?

  • Short for ‘embedded SIM’.

  • An eSIM is a memory chip (processing is moved to the phone) placed on a card built into your phone. Not removable.

  • User and subscription information is stored on eSIMs, but users can manage and replace their profiles as needed.

  • An eSIM, therefore, is the more digitized, flexible evolution of traditional SIMs. Imagine a digital vs. physical ticket or boarding pass.

4 reasons Saily is the best eSIM for travelers

With the technical stuff out of the way, let’s take a look at some of the main user advantages of eSIMs, and why Saily is the best pick for explorers and adventurers in need of speedy internet access.

Effortless installation & support

No more poking paper clips into your SIM card slot. With Saily, you’ll be able to smoothly change or add phone plans by scanning a QR code or following a simple app. No need to juggle between multiple SIMs while on the go. Saily also offers round-the-clock support, in the unlikely case you run into any activation issues. We’re here to help, 24/7 – whether you’re on the beach in Brazil or the Shibuya crossing in Tokyo.

Smooth travel and connectivity

With Saily, users can find the best data plans in over 150 countries – and enjoy easy and safer internet access wherever they go. Buy your plan in advance, and you’ll avoid any surprise roaming charges that sneak up on you as you get accustomed to your new surroundings. You’re connected from the moment you land. No need to line up in the airports either, just head straight for your hotel or hit the streets!

Reduced environmental impact

The difference in environmental impact is huge. Currently, approximately 4.5 billion plastic SIM cards are manufactured every year. According to a 2022 Life Cycle Assessment (LCA), “eSIM technology scored 46 percent lower in carbon emissions when compared to traditional SIM cards. While the production of a traditional SIM emits a reported 229g CO2 equivalent through all of its life cycle phases (production, transport, usage, end device hardware and End of Life), an eSIM emits only 123g CO2 equivalent.”

More security when traveling

It’s common knowledge: using public Wi-Fi is risky. Add in the stress and fatigue that comes with travel, and people easily become forgetful or careless when it comes to security. According to recent studies published by Forbes Advisor, 40% of individuals have experienced a breach in their online security while accessing public Wi-Fi networks while traveling.

Of course, a VPN is already a powerful protective layer if you’re connecting to a public network. But as Vykintas Maknickas, Head of Product Strategy at Nord Security, puts it: “When traveling, you want to have continuous access to the internet, but that’s not always easy. Even if there’s a coffee shop nearby with an open Wi-Fi network, you don’t want to risk exposing your device to a network you’re not sure is secure. Saily will ensure you don’t need to use public Wi-Fi networks that you don’t trust to access the internet.”

Are you inspired by innovation and the challenge of connecting the world? Engineers, designers, QAs, marketers – join the Saily crew in building technology that enables reliable, consistent internet access to travelers and explorers worldwide. Check out our open positions here. 

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.