{"id":13999,"date":"2020-07-06T06:56:54","date_gmt":"2020-07-06T10:56:54","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=13999"},"modified":"2025-03-04T23:23:12","modified_gmt":"2025-03-05T04:23:12","slug":"the-age-of-remote-work","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-age-of-remote-work\/","title":{"rendered":"The Age of Remote Work"},"content":{"rendered":"<h2><strong>5 Key Information Security Risks for Home Workers<\/strong><\/h2>\n<p>For millions of people across the globe, 2020 has seen a seismic change in the way in which people work. According to data from the Office for National Statistics, a mere <a href=\"https:\/\/www.ons.gov.uk\/employmentandlabourmarket\/peopleinwork\/employmentandemployeetypes\/articles\/coronavirusandhomeworkingintheuklabourmarket\/2019\">5% of the UK labor force worked predominantly from home in 2019<\/a>, a figure which has increased dramatically since the pandemic.<\/p>\n<p>With many countries banning any non-essential travel and remote work being encouraged and assumed whenever possible, it is likely that we will see a significant increase in out-of-office work long after lockdown has come to an end.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-14000\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/10\/the-age-of-remote-work-1024x683.jpg\" alt=\"the-age-of-remote-work\" width=\"800\" height=\"534\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/10\/the-age-of-remote-work-1024x683.jpg 1024w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/10\/the-age-of-remote-work-600x400.jpg 600w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/10\/the-age-of-remote-work-768x512.jpg 768w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/10\/the-age-of-remote-work-1536x1024.jpg 1536w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/10\/the-age-of-remote-work.jpg 1920w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p style=\"text-align: center;\">Source: <a href=\"https:\/\/unsplash.com\/photos\/VvAcrVa56fc\">Unsplash<\/a><\/p>\n<h2><strong>Security Risks<\/strong><\/h2>\n<p>During this unprecedented time, it is unsurprising that many have faltered. Research suggests that around 29% of companies did not have a business plan to protect their network during a major crisis, as well as 86% of companies, between February and March of this year, experiencing security disruptions.<\/p>\n<p>As well as these disturbing facts, 73% of surveyed employees working from home have not received any specific cyber or information security awareness guidance or training.<\/p>\n<p>Though the cost of the pandemic is unquestionable, with trends pointing towards remote work becoming the new norm, it is time that those who are fortunate enough to be able to work from home, learn how to work securely.<\/p>\n<h2><strong>Five Key Remote Work Tips<\/strong><\/h2>\n<p><strong>1. Video Conferencing<\/strong><\/p>\n<p>With face-to-face communication now essentially impossible, the use of video conferencing software, such as Zoom, has now become common practice for both professional and social interaction.<\/p>\n<p>Because of the external imperative, many users and companies quickly adopted remote work solutions without a complete understanding of the security standards of many of these companies. Zoom, for example, originally proclaimed to offer <a href=\"https:\/\/blog.zoom.us\/wordpress\/2020\/04\/01\/facts-around-zoom-encryption-for-meetings-webinars\/\">end-to-end encryption<\/a>, a claim which was later understood to be inaccurate.<\/p>\n<p>But it is not just the inherent security of the software which users should be wary of, it is also the way in which they are used.<\/p>\n<p>Many video conferencing products offer the option to \u2018lock\u2019 meetings once all participants have joined, a feature which can undoubtedly help protect confidentiality. Likewise, meeting ID\u2019s should be protected and only shared with authorised individuals; as in some instances, all that is required to enter is an onscreen code.<\/p>\n<p>Depending on the type of software being used, there are many controls available, and whichever you choose, these controls should be both understood and utilised.<\/p>\n<p>&nbsp;<\/p>\n<style type=\"text\/css\">\r\n.ad-area1 { border-radius: 8px; overflow: hidden; padding: 20px 10px; box-shadow: 0 0px 15px #ddd; margin: 15px 8px; border-top: 5px solid #a81010; }\r\n.left-area, .right-area { width: 50%; float: left; }\r\n.left-area { padding-top: 12px; }\r\n.left-area img { max-width: 95%; }\r\n.right-area h2 { text-align: center; padding-bottom: 0; font-size: 26px; font-weight: 900; margin-top: 0; }\r\n.right-area h2 span { color: #a81010; }\r\n.right-area h3 { text-align: center; font-size: 16px; text-transform: capitalize; font-weight: 700; padding-top: 10px; padding-bottom: 10px; line-height: normal; }\r\n.ad-area-head { text-align: center; font-weight: 900; font-size: 14px; border-bottom: 1px dotted #ddd; width: 70%; margin: 0 auto; }\r\n.ad-area-desc { padding: 5px 0; }\r\n.right-area p { text-align: center; font-size: 12px; padding-bottom: 0; margin: 0; line-height: 2; }\r\n.ad-area-desc b { font-weight: 700; display: block; }\r\n.ad-area1-learn { display: table; margin: 0 auto; background: #a81010; color: #fff; padding: 6px 20px; border-radius: 50px; font-size: 14px; }\r\n.ad-area1-learn:hover { color: #fff; }\r\n\r\n@media (max-width:320px), (max-width:360px), (max-width:375px), (max-width:400px), (max-width:480px) {\r\n.left-area, .right-area { width: 100%; float: none; }\r\n}\r\n<\/style>\r\n<div class=\"ad-area1\">\r\n\t<div style=\"overflow: hidden;\">\r\n\t\t<div class=\"left-area\">\r\n\t\t\t<img decoding=\"async\" src=\"https:\/\/cloudapper.com\/wp-content\/uploads\/2020\/05\/CloudDesk_BlogDisplayAd-1.png\" alt=\"Bio-plugin-SDK\" width=\"\">\r\n\t\t<\/div>\r\n\t\t<div class=\"right-area\">\r\n\t\t\t<h2><span>CloudDesk\u00ae<\/span><\/h2>\r\n\t\t\t<h3>Employee Monitoring Software<\/h3>\r\n\t\t\t<div class=\"ad-area-head\">Key Feature<\/div>\r\n\t\t\t<div class=\"ad-area-desc\">\r\n\t\t\t\t<p>- Time Tracking <\/p>\r\n\t\t\t\t<p>- Face ID Verification<\/p>\r\n\t\t\t\t<p>- PC &amp; Web Activity Monitoring<\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t<a class=\"ad-area1-learn\" href=\"https:\/\/web.cloudapper.com\/login?templaterefid=5f9a52bd-5427-4c43-b5b7-b193db20b70b&amp;issignup=true\">Try Free Trial Now<\/a>\r\n\t\t<\/div>\r\n\t<\/div>\t\r\n<\/div>\n<p><strong>2. Home Networks<\/strong><\/p>\n<p>Although typically safer than a public Wi-Fi network, your home internet can also present risks. Firstly, the type of encryption used by your home router.<\/p>\n<p>Depending on your model, you may be using a more or less secure form of encryption to carry your data; from the weak and outdated WEP (Wired Equivalent Privacy) to the common and strong WPA2 (Wi-Fi Protected Access II). Whenever possible the most secure form of encryption available should be used.<\/p>\n<p>When setting up a router, it is also recommended that WPS (Wi-Fi Protected Setup) is disabled. The function of this is to allow a quick method of connecting devices, and though it may appear merely convenient, this function could allow anyone with momentary physical access to your router, permanent access to your network.<\/p>\n<p>Likewise creating a MAC address filter allows you to build a list of trusted devices which are permitted to connect to the network, whilst excluding non-trusted devices.<\/p>\n<p>Finally, changing your network name and password from their defaults should also be standard practice. A network&#8217;s name can frequently give an attacker an indication of the type of network, thus offering them an advantage, and likewise, default passwords may be more easily broken than a novel alternative.<\/p>\n<p><strong>3. Software Updates<\/strong><\/p>\n<p>Though it may not sound particularly thrilling, ensuring that the many forms of software that you use are up to date, is vital for ensuring the security of your information. Whilst in the office these updates are likely taken care of by administrators, but just because you are working from home, does not mean this process can be ignored.<\/p>\n<p>Not a day goes by where a new vulnerability or exploit is found, and though many of these software weak spots are found by well-intentioned security researchers, that is not to say that cybercriminals aren\u2019t working around the clock to find new ways to scam and extort users.<\/p>\n<p>Just like the operating system on your mobile device, the software on your PC or laptop requires attention. Most of the time you will be altered to available updates and given the option to \u2018update now\u2019 or to delay the update. Updating the software properly will also be beneficial for its speed. For example you can <a href=\"https:\/\/10web.io\/blog\/speed-up-wordpress\/\">speed up WordPress<\/a> by just updating it in a right time.<\/p>\n<p>If you\u2019re in the middle of a piece of time sensitive work, it is reasonable to delay an update, but by ignoring these updates for an extended period of time, you expose yourself, your devices and your information up to vulnerabilities.<\/p>\n<p><strong>4. Device Security<\/strong><\/p>\n<p>When working inside an office, devices rarely move around. Likewise, access to devices and accounts invariably require passwords to be set. This is not the case at home.<\/p>\n<p>The latest research suggests that around two-thirds of respondents (68%) use <a href=\"https:\/\/www.kaspersky.com\/blog\/report-covid-wfh\/35244\/\">personal devices when working from home<\/a>, a statistic which should be a concern of organizations of all kinds. Though not necessarily less secure than a work device, a personal device can present a different set of risks.<\/p>\n<p>For example, in many cases, personal devices are shared amongst a household. Ideally, any device being used for work purposes, should be used for that purpose alone. If this is not possible, it should be ensured that any sensitive or confidential information is adequately protected, and additional guest accounts added.<\/p>\n<p>It may sound overly protective, but consider the possibility of a child, for example, inadvertently clicking on a phishing email whilst logged onto your work account.<\/p>\n<p><strong>5. Remote Employee Monitoring<\/strong><\/p>\n<p><a href=\"https:\/\/www.m2sys.com\/clouddesk-remote-employee-monitoring-software\/?utm_campaign=The%20Age%20of%20Remote%20Work&amp;utm_medium=blog%20post&amp;utm_source=blog\">Employee monitoring software<\/a>&#8216;s are designed to track and evaluate users\u2019 computer activities. By becoming fully aware of all actions performed by the remote workers throughout the day, companies can detect any malpractice and reveal reasons for low productivity and take effective measures to counter them.<\/p>\n<p>This is possible as the software takes periodical screenshots of the employee computers. It also keeps a tab on running web and application usage. With all this information, companies get a full view of employee activities and spot any sign of malpractice or performance degradation. Employees, on the other hand, can check their productive and idle times throughout the work hours from this tool and improve their performance accordingly.<\/p>\n<p>There are many things that you and employees can do to help ensure strong information security during this time of remote work and coronavirus. It is important that going forwards, as remote work becomes more common, that advice such as the above is adhered to, and that standards do not fall at a time when businesses face such levels of uncertainty.<\/p>\n<p style=\"font-weight: 400;\"><em>\u201cGuest blog courtesy of\u00a0<a href=\"https:\/\/www.hutsix.io\/\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.hutsix.io&amp;source=gmail&amp;ust=1615520543826000&amp;usg=AFQjCNEgdr1b3_rBlfJN8jbAbsk9Ke9F_w\">Hut Six Security<\/a>,\u00a0an information security awareness solution that combines training tutorials with phishing simulation to help build secure cultures in the workplace.\u201d<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>5 Key Information Security Risks for Home Workers For millions of people across the globe, 2020 has seen a seismic<\/p>\n","protected":false},"author":398,"featured_media":14000,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"The Age of Remote Work","_yoast_wpseo_metadesc":"","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[90],"tags":[],"class_list":["post-13999","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guest-blog-posts"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Age of Remote Work<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-age-of-remote-work\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Age of Remote Work\" \/>\n<meta property=\"og:description\" content=\"5 Key Information Security Risks for Home Workers For millions of people across the globe, 2020 has seen a seismic\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-age-of-remote-work\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-06T10:56:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-05T04:23:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/10\/the-age-of-remote-work.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-age-of-remote-work\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-age-of-remote-work\/\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b\"},\"headline\":\"The Age of Remote Work\",\"datePublished\":\"2020-07-06T10:56:54+00:00\",\"dateModified\":\"2025-03-05T04:23:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-age-of-remote-work\/\"},\"wordCount\":1239,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"articleSection\":[\"Guest Blog Posts\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-age-of-remote-work\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-age-of-remote-work\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-age-of-remote-work\/\",\"name\":\"The Age of Remote Work\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2020-07-06T10:56:54+00:00\",\"dateModified\":\"2025-03-05T04:23:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-age-of-remote-work\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-age-of-remote-work\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-age-of-remote-work\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"The Age of Remote Work\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"caption\":\"Guest\"},\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/guest\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Age of Remote Work","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-age-of-remote-work\/","og_locale":"en_US","og_type":"article","og_title":"The Age of Remote Work","og_description":"5 Key Information Security Risks for Home Workers For millions of people across the globe, 2020 has seen a seismic","og_url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-age-of-remote-work\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2020-07-06T10:56:54+00:00","article_modified_time":"2025-03-05T04:23:12+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/10\/the-age-of-remote-work.jpg","type":"image\/jpeg"}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Guest","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-age-of-remote-work\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-age-of-remote-work\/"},"author":{"name":"Guest","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b"},"headline":"The Age of Remote Work","datePublished":"2020-07-06T10:56:54+00:00","dateModified":"2025-03-05T04:23:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-age-of-remote-work\/"},"wordCount":1239,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"articleSection":["Guest Blog Posts"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-age-of-remote-work\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-age-of-remote-work\/","url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-age-of-remote-work\/","name":"The Age of Remote Work","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2020-07-06T10:56:54+00:00","dateModified":"2025-03-05T04:23:12+00:00","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-age-of-remote-work\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-age-of-remote-work\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-age-of-remote-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"The Age of Remote Work"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b","name":"Guest","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","caption":"Guest"},"url":"https:\/\/www.m2sys.com\/blog\/author\/guest\/"}]}},"modified_by":"Shakib Khan","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/13999"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/398"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=13999"}],"version-history":[{"count":13,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/13999\/revisions"}],"predecessor-version":[{"id":21806,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/13999\/revisions\/21806"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/14000"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=13999"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=13999"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=13999"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}