


{"id":9353,"date":"2022-06-23T20:15:09","date_gmt":"2022-06-23T16:15:09","guid":{"rendered":"https:\/\/krisp.ai\/blog\/?p=9353"},"modified":"2022-07-05T01:23:26","modified_gmt":"2022-07-04T21:23:26","slug":"hybrid-work-privacy","status":"publish","type":"post","link":"https:\/\/krisp.ai\/blog\/hybrid-work-privacy\/","title":{"rendered":"Privacy in the World of Hybrid Work. What Does it Mean?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Hybrid work comes with many upsides. It gives employees the flexibility they crave\u2014without sacrificing the in-person time in the office that leads to meaningful relationships and improved collaboration.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, there are new downsides to be aware of as well. Specifically, privacy risks. When your workforce starts splitting its time between the office and their own homes, it introduces cybersecurity concerns that are important to start addressing immediately.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you\u2019re not sure what this means and how to get started, don\u2019t worry. In this blog post, we\u2019ll explore what privacy in the world of hybrid work looks like and share tips to help you start protecting your organization.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Why hybrid work creates more privacy risks\u00a0<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">What exactly is it about the nature of the <\/span><a href=\"https:\/\/krisp.ai\/blog\/hybrid-work-model\/\"><span style=\"font-weight: 400;\">hybrid work model<\/span><\/a><span style=\"font-weight: 400;\"> that introduces new privacy risks, compared to a fully in-office setup?\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The short answer is that your organization no longer has full control over the working environment.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the office, your IT team works hard to ensure all your networks are protected and your computers have the right software installed. Even just by nature of working in a secured building, you\u2019re mitigating your cybersecurity risk.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, when people have the option to work from home, your company no longer has control over the workspace. Your employee may have family members, guests, and contractors coming in and out of their house all day. Or they may choose to work at a coffee shop, where strangers can easily see what\u2019s on their laptops or where their device may be left unattended for short periods of time.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">All of these factors lead to increased privacy risks.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">What are the top 4 security challenges of hybrid work?\u00a0<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Let\u2019s get more specific and explore the top five privacy challenges your hybrid workforce may be facing right now:\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">1. Your employees aren\u2019t aware of cybersecurity concerns<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Most people aren\u2019t aware of the privacy risks associated with working outside the office. This is a security challenge in itself. Why? If your employees aren\u2019t aware of the potential dangers, they won\u2019t behave in a way that keeps themselves protected.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let\u2019s say, for instance, your employee is at a co-working space and needs to use the restroom. Someone who isn\u2019t aware of the potential security risks may leave their laptop open and leave it unattended for several minutes. This may give a bad actor time to steal the computer or peek at sensitive information on the screen.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">On the other hand, if your employee is aware of the security issues, they may choose to pack up their laptop and bring it with them to the restroom. This difference in mindset can make all the difference when it comes to privacy.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">2. Public spaces lack visual privacy<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">According to a recent <\/span><a href=\"https:\/\/www.ponemon.org\/userfiles\/filemanager\/bkox4uly18udll2ydgyg\/\"><span style=\"font-weight: 400;\">study<\/span><\/a><span style=\"font-weight: 400;\"> by the Ponemon Institute, an average of 40% of organizations&#8217; hybrid and remote workers spend time in coffee shops and shared workspaces.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The problem with these public workspaces is that they lack visual privacy. In other words, it\u2019s easy for people to see what your employees are working on\u2014including sensitive company information, passwords, and more. This can then lead to potential breaches in security.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">3. Transporting devices creates risk<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Another risk is the transportation of company phones and laptops. When your employees have to physically move their devices from one location to another, it increases the chance of these items getting lost or stolen. This, of course, has many negative implications from a privacy perspective.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">4. Secure networks aren\u2019t guaranteed<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Another challenge you\u2019re likely facing is the fact that you can\u2019t control the networks your employees use.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This means that if they\u2019re working on an unsecured WiFi network, for example, they may be vulnerable to attacks that allow the bad actor to gain access to sensitive information\u2014including passwords, key identifiers (like social security numbers), and company data.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">How to address privacy risks created by hybrid work<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Thankfully, there are steps your organization can take to mitigate the privacy risks introduced by hybrid work. Here are a few ways you can get started:\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">1. Invest in educating your employees<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The first step is to make your workforce aware of privacy issues. As we mentioned before, most people aren\u2019t aware of the risks that come with working outside of the office. By simply raising visibility about the potential risks, your employees can adjust their behaviors accordingly.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">How exactly do you educate your employees about this topic? There are a variety of tactics you can turn to, such as:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A mandatory in-person or virtual security training session.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A question and answer session with the IT team.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Printed and digital materials that share guidelines on how employees can protect themselves from cyber attacks in public settings.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Email or Slack reminders that contain helpful tips on how to maintain privacy outside of the office.<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">2. Craft comprehensive (but realistic) policies<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Education is a great start. But we encourage companies to take things one step further by crafting an actual policy around privacy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The benefit of crafting a company policy is that it creates clear guidelines and expectations for your employees. This makes it much more likely that people will actually follow what you propose. Your policy should cover:\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The company\u2019s expectations for employees when doing work outside of the office.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The technologies, software, or tools that everyone is expected to use or have downloaded on their devices.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Guidelines on how to take precautions in public workspaces.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">What to do if someone experiences a breach, attack, or leak.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Who to turn to with privacy-related questions, concerns, or incidences.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">However, remember to keep your policies reasonable. It\u2019s not realistic, for example, to ask employees to always keep their laptops with them while they\u2019re at home. Or to demand that employees never work out of a coffee shop or co-working space.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While these rules would certainly mitigate the risk of a cyberattack, they\u2019re unrealistic and won\u2019t be followed by the majority of your workforce.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">3. Provide all laptops with privacy filters<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Even though you can\u2019t control the environment your employees work in, you can still offer some forms of protection.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you\u2019re concerned about visual security, for instance, provide everyone with a privacy filter for their laptops. These filters blacken out the angled view of onlookers, while providing an undisturbed viewing experience for the person using the device.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Similarly, you can make sure that all company-provided laptops have the proper software pre-installed on them so you don\u2019t have to put that burden on employees.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These small investments can give you more peace of mind about potential security issues.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">4. Introduce the right technologies<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">According to the same Ponemon study, IT managers believe these five technologies are the most effective for protecting privacy and security in a remote or hybrid work environment:\u00a0<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\"><b>Incident response platforms. <\/b><span style=\"font-weight: 400;\">This is software that guides, assists and automates incident response. So if there\u2019s a security incident, this technology will help your IT team collect all the necessary information, identify trends, and find a solution to the problem.\u00a0<\/span><\/li>\n<li aria-level=\"1\"><b>Anti-virus\/anti-malware software.<\/b><span style=\"font-weight: 400;\"> This type of program helps prevent, detect, and protect IT systems and individual computers from malicious software, which is also referred to as malware.\u00a0<\/span><\/li>\n<li aria-level=\"1\"><b>Big data analytics for cybersecurity. <\/b><span style=\"font-weight: 400;\">This technology helps your IT team collect, visualize, and analyze data to predict and prepare for potential cyber attacks.\u00a0<\/span><\/li>\n<li aria-level=\"1\"><b>Identity management and authentication. <\/b><span style=\"font-weight: 400;\">This is a common tool\u00a0 that\u2019s used to authenticate the identity of a person so they can have access to your company\u2019s applications, systems, and networks.<\/span><\/li>\n<li aria-level=\"1\"><b>Intrusion detection and prevention systems. <\/b><span style=\"font-weight: 400;\">This software monitors the events occurring in your network for signs of possible incidents, violations, or imminent threats to your security policies\u2014and stops the detected incidents when they occur.<\/span><\/li>\n<\/ul>\n<p><strong>Tip:<\/strong> In addition to your tool stack, try Krisp noise cancelling app. It acts as an online meeting insurance, protecting you and your team from distracting background noise.<\/p>\n<p>[demo-new]<\/p>\n<p><span style=\"font-weight: 400;\">Having these various technologies in place can help your company keep your network access secure, detect possible threats, and handle security incidents more smoothly.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Mitigate your cybersecurity risk by introducing these changes today<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">You don\u2019t have to sacrifice the benefits of hybrid work out of fear of cybersecurity issues. By taking a few steps in the right direction, you can significantly minimize the chances of any breaches, leaks, or attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you\u2019re curious to learn more about other tools that can support your transition to hybrid work, check out our article about the must-have <\/span><a href=\"https:\/\/krisp.ai\/blog\/tools-for-hybrid-teams\/\"><span style=\"font-weight: 400;\">tools for hybrid teams<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hybrid work comes with many upsides. It gives employees the flexibility they crave\u2014without sacrificing the in-person time in the office that leads to meaningful relationships and improved collaboration.\u00a0 However, there are new downsides to be aware of as well. Specifically, privacy risks. When your workforce starts splitting its time between the office and their own [&hellip;]<\/p>\n","protected":false},"author":63,"featured_media":9347,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"two_page_speed":[]},"categories":[413],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.2 (Yoast SEO v23.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Privacy in the World of Hybrid Work. What Does it Mean?<\/title>\n<meta name=\"description\" content=\"Hybrid work introduces new cybersecurity concerns. Here\u2019s how to ensure your employees\u2014and your organization\u2014stay protected.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/krisp.ai\/blog\/hybrid-work-privacy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privacy in the World of Hybrid Work. What Does it Mean?\" \/>\n<meta property=\"og:description\" content=\"Hybrid work introduces new cybersecurity concerns. Here\u2019s how to ensure your employees\u2014and your organization\u2014stay protected.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/krisp.ai\/blog\/hybrid-work-privacy\/\" \/>\n<meta property=\"og:site_name\" content=\"Krisp\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/krispHQ\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-23T16:15:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-04T21:23:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/krisp.ai\/blog\/wp-content\/uploads\/2022\/07\/privacy-challenges-in-hybrid-work.png\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sophia Lee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@krispHQ\" \/>\n<meta name=\"twitter:site\" content=\"@krispHQ\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/krisp.ai\/blog\/hybrid-work-privacy\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/krisp.ai\/blog\/hybrid-work-privacy\/\"},\"author\":{\"name\":\"Sophia Lee\",\"@id\":\"https:\/\/krisp.ai\/blog\/#\/schema\/person\/53487f26c8cd671af1bbcda3de7d990b\"},\"headline\":\"Privacy in the World of Hybrid Work. What Does it Mean?\",\"datePublished\":\"2022-06-23T16:15:09+00:00\",\"dateModified\":\"2022-07-04T21:23:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/krisp.ai\/blog\/hybrid-work-privacy\/\"},\"wordCount\":1439,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\/\/krisp.ai\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/krisp.ai\/blog\/hybrid-work-privacy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/krisp.ai\/blog\/wp-content\/uploads\/2022\/07\/privacy-challenges-in-hybrid-work.png\",\"articleSection\":[\"Enterprise\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/krisp.ai\/blog\/hybrid-work-privacy\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/krisp.ai\/blog\/hybrid-work-privacy\/\",\"url\":\"https:\/\/krisp.ai\/blog\/hybrid-work-privacy\/\",\"name\":\"Privacy in the World of Hybrid Work. What Does it Mean?\",\"isPartOf\":{\"@id\":\"https:\/\/krisp.ai\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/krisp.ai\/blog\/hybrid-work-privacy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/krisp.ai\/blog\/hybrid-work-privacy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/krisp.ai\/blog\/wp-content\/uploads\/2022\/07\/privacy-challenges-in-hybrid-work.png\",\"datePublished\":\"2022-06-23T16:15:09+00:00\",\"dateModified\":\"2022-07-04T21:23:26+00:00\",\"description\":\"Hybrid work introduces new cybersecurity concerns. Here\u2019s how to ensure your employees\u2014and your organization\u2014stay protected.\",\"breadcrumb\":{\"@id\":\"https:\/\/krisp.ai\/blog\/hybrid-work-privacy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/krisp.ai\/blog\/hybrid-work-privacy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/krisp.ai\/blog\/hybrid-work-privacy\/#primaryimage\",\"url\":\"https:\/\/krisp.ai\/blog\/wp-content\/uploads\/2022\/07\/privacy-challenges-in-hybrid-work.png\",\"contentUrl\":\"https:\/\/krisp.ai\/blog\/wp-content\/uploads\/2022\/07\/privacy-challenges-in-hybrid-work.png\",\"width\":500,\"height\":350,\"caption\":\"hybrid work privacy\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/krisp.ai\/blog\/hybrid-work-privacy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/krisp.ai\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy in the World of Hybrid Work. What Does it Mean?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/krisp.ai\/blog\/#website\",\"url\":\"https:\/\/krisp.ai\/blog\/\",\"name\":\"Krisp\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\/\/krisp.ai\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/krisp.ai\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/krisp.ai\/blog\/#organization\",\"name\":\"Krisp\",\"url\":\"https:\/\/krisp.ai\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/krisp.ai\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/krisp.ai\/blog\/wp-content\/uploads\/2024\/10\/K.png\",\"contentUrl\":\"https:\/\/krisp.ai\/blog\/wp-content\/uploads\/2024\/10\/K.png\",\"width\":696,\"height\":696,\"caption\":\"Krisp\"},\"image\":{\"@id\":\"https:\/\/krisp.ai\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/krispHQ\/\",\"https:\/\/x.com\/krispHQ\",\"https:\/\/www.linkedin.com\/company\/krisphq\/\",\"https:\/\/www.youtube.com\/channel\/UCAMZinJdR9P33fZUNpuxXtg\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/krisp.ai\/blog\/#\/schema\/person\/53487f26c8cd671af1bbcda3de7d990b\",\"name\":\"Sophia Lee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/krisp.ai\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2382958d5117edeea25756fcce310687?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2382958d5117edeea25756fcce310687?s=96&d=mm&r=g\",\"caption\":\"Sophia Lee\"},\"description\":\"Sophia Lee is a freelance writer fluent in the language of startups. She loves helping bring the stories of B2B brands to life, and her experience spans a wide range of industries\u2014from HR to healthcare.\",\"url\":\"https:\/\/krisp.ai\/blog\/author\/sophia-lee\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Privacy in the World of Hybrid Work. What Does it Mean?","description":"Hybrid work introduces new cybersecurity concerns. Here\u2019s how to ensure your employees\u2014and your organization\u2014stay protected.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/krisp.ai\/blog\/hybrid-work-privacy\/","og_locale":"en_US","og_type":"article","og_title":"Privacy in the World of Hybrid Work. What Does it Mean?","og_description":"Hybrid work introduces new cybersecurity concerns. Here\u2019s how to ensure your employees\u2014and your organization\u2014stay protected.","og_url":"https:\/\/krisp.ai\/blog\/hybrid-work-privacy\/","og_site_name":"Krisp","article_publisher":"https:\/\/www.facebook.com\/krispHQ\/","article_published_time":"2022-06-23T16:15:09+00:00","article_modified_time":"2022-07-04T21:23:26+00:00","og_image":[{"width":500,"height":350,"url":"https:\/\/krisp.ai\/blog\/wp-content\/uploads\/2022\/07\/privacy-challenges-in-hybrid-work.png","type":"image\/png"}],"author":"Sophia Lee","twitter_card":"summary_large_image","twitter_creator":"@krispHQ","twitter_site":"@krispHQ","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/krisp.ai\/blog\/hybrid-work-privacy\/#article","isPartOf":{"@id":"https:\/\/krisp.ai\/blog\/hybrid-work-privacy\/"},"author":{"name":"Sophia Lee","@id":"https:\/\/krisp.ai\/blog\/#\/schema\/person\/53487f26c8cd671af1bbcda3de7d990b"},"headline":"Privacy in the World of Hybrid Work. What Does it Mean?","datePublished":"2022-06-23T16:15:09+00:00","dateModified":"2022-07-04T21:23:26+00:00","mainEntityOfPage":{"@id":"https:\/\/krisp.ai\/blog\/hybrid-work-privacy\/"},"wordCount":1439,"commentCount":3,"publisher":{"@id":"https:\/\/krisp.ai\/blog\/#organization"},"image":{"@id":"https:\/\/krisp.ai\/blog\/hybrid-work-privacy\/#primaryimage"},"thumbnailUrl":"https:\/\/krisp.ai\/blog\/wp-content\/uploads\/2022\/07\/privacy-challenges-in-hybrid-work.png","articleSection":["Enterprise"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/krisp.ai\/blog\/hybrid-work-privacy\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/krisp.ai\/blog\/hybrid-work-privacy\/","url":"https:\/\/krisp.ai\/blog\/hybrid-work-privacy\/","name":"Privacy in the World of Hybrid Work. What Does it Mean?","isPartOf":{"@id":"https:\/\/krisp.ai\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/krisp.ai\/blog\/hybrid-work-privacy\/#primaryimage"},"image":{"@id":"https:\/\/krisp.ai\/blog\/hybrid-work-privacy\/#primaryimage"},"thumbnailUrl":"https:\/\/krisp.ai\/blog\/wp-content\/uploads\/2022\/07\/privacy-challenges-in-hybrid-work.png","datePublished":"2022-06-23T16:15:09+00:00","dateModified":"2022-07-04T21:23:26+00:00","description":"Hybrid work introduces new cybersecurity concerns. Here\u2019s how to ensure your employees\u2014and your organization\u2014stay protected.","breadcrumb":{"@id":"https:\/\/krisp.ai\/blog\/hybrid-work-privacy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/krisp.ai\/blog\/hybrid-work-privacy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/krisp.ai\/blog\/hybrid-work-privacy\/#primaryimage","url":"https:\/\/krisp.ai\/blog\/wp-content\/uploads\/2022\/07\/privacy-challenges-in-hybrid-work.png","contentUrl":"https:\/\/krisp.ai\/blog\/wp-content\/uploads\/2022\/07\/privacy-challenges-in-hybrid-work.png","width":500,"height":350,"caption":"hybrid work privacy"},{"@type":"BreadcrumbList","@id":"https:\/\/krisp.ai\/blog\/hybrid-work-privacy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/krisp.ai\/blog\/"},{"@type":"ListItem","position":2,"name":"Privacy in the World of Hybrid Work. What Does it Mean?"}]},{"@type":"WebSite","@id":"https:\/\/krisp.ai\/blog\/#website","url":"https:\/\/krisp.ai\/blog\/","name":"Krisp","description":"Blog","publisher":{"@id":"https:\/\/krisp.ai\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/krisp.ai\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/krisp.ai\/blog\/#organization","name":"Krisp","url":"https:\/\/krisp.ai\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/krisp.ai\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/krisp.ai\/blog\/wp-content\/uploads\/2024\/10\/K.png","contentUrl":"https:\/\/krisp.ai\/blog\/wp-content\/uploads\/2024\/10\/K.png","width":696,"height":696,"caption":"Krisp"},"image":{"@id":"https:\/\/krisp.ai\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/krispHQ\/","https:\/\/x.com\/krispHQ","https:\/\/www.linkedin.com\/company\/krisphq\/","https:\/\/www.youtube.com\/channel\/UCAMZinJdR9P33fZUNpuxXtg"]},{"@type":"Person","@id":"https:\/\/krisp.ai\/blog\/#\/schema\/person\/53487f26c8cd671af1bbcda3de7d990b","name":"Sophia Lee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/krisp.ai\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2382958d5117edeea25756fcce310687?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2382958d5117edeea25756fcce310687?s=96&d=mm&r=g","caption":"Sophia Lee"},"description":"Sophia Lee is a freelance writer fluent in the language of startups. She loves helping bring the stories of B2B brands to life, and her experience spans a wide range of industries\u2014from HR to healthcare.","url":"https:\/\/krisp.ai\/blog\/author\/sophia-lee\/"}]}},"_links":{"self":[{"href":"https:\/\/krisp.ai\/blog\/wp-json\/wp\/v2\/posts\/9353"}],"collection":[{"href":"https:\/\/krisp.ai\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/krisp.ai\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/krisp.ai\/blog\/wp-json\/wp\/v2\/users\/63"}],"replies":[{"embeddable":true,"href":"https:\/\/krisp.ai\/blog\/wp-json\/wp\/v2\/comments?post=9353"}],"version-history":[{"count":4,"href":"https:\/\/krisp.ai\/blog\/wp-json\/wp\/v2\/posts\/9353\/revisions"}],"predecessor-version":[{"id":9357,"href":"https:\/\/krisp.ai\/blog\/wp-json\/wp\/v2\/posts\/9353\/revisions\/9357"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/krisp.ai\/blog\/wp-json\/wp\/v2\/media\/9347"}],"wp:attachment":[{"href":"https:\/\/krisp.ai\/blog\/wp-json\/wp\/v2\/media?parent=9353"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/krisp.ai\/blog\/wp-json\/wp\/v2\/categories?post=9353"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/krisp.ai\/blog\/wp-json\/wp\/v2\/tags?post=9353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}