Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

4/22/2021
05:35 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

TeamViewer Survey: Businesses Prepare for Post-Pandemic 'Hybrid' Workforce with New Policies, Tech Infrastructure

TAMPA BAY, Fla., April 22, 2021 — A research project sponsored by TeamViewer, a global leader in secure remote connectivity solutions, found that 75% of businesses grew during the pandemic, thriving in a remote environment, but now eye new policies and tech infrastructure to support a clear trend toward a longer-term hybrid work environment.

According to the survey of 200 professionals across a range of industries, which was completed in March 2021, businesses have already begun shifting away from full remote and moving toward a hybrid workforce. More than half (52%) of respondents currently work remotely while 30% are part time at home and part time in the office, and 18% are full time in the office. By the end of 2021, 42% expect to be remote, 30% expect to be hybrid and 29% in the office/ workplace. Longer term, the most anticipated policy change in 2021 includes a hybrid schedule of “2 day in the office per week.”

“During the past year, businesses have demonstrated their remarkable ability to grow and thrive in a remote work environment,” said Finn Faldi, President - Americas at TeamViewer. “Looking beyond the Pandemic, we’re now seeing companies reimagine fundamental workplace structures that favor a hybrid work arrangement, relying on technology that will seamlessly connect both in-office and remote employees wherever they are located.”

Many respondents indicated a desire to stay full remote with 46% saying they would “definitely” relocate, and 32% saying they would “probably relocate” within the next 2 years if they had the ability to work remotely. In fact, 34% said they would “probably” be willing to take a pay cut and 30% said they would “definitely” take a pay cut in exchange for being able to work remote indefinitely.

As the workforce skews increasingly toward remote/ hybrid arrangements, most respondents agree there are significant technology and process challenges, including team cohesion (13%), collaboration (13%), and managing through Zoom fatigue (12%). The most important technologies required to manage these challenges, according to the survey, include video conferencing (15%), IT management systems (15%) and IT security tools (13%).

Businesses are meeting these challenges with new investments in technology. More than 69% of companies surveyed are investing in new cloud architecture to power a hybrid workforce, where some employees are remote, and others are physically present. In addition, 77% of companies are reconsidering IT security to secure a hybrid workforce where some employees are remote, and others are physically present.

Other key findings:

  • Companies that retain talent are more likely to work remotely: Top performing, frequently promoted employees are 46% more likely to say they expect to still be working remotely throughout 2021. Similarly, companies that retain their top-performing employees are 4x more likely to consider going completely remote even after COVID-19.
  • Industries embrace in-person vs. hybrid workplaces differently: Industries moving fastest to in-person include Travel and Tourism, Real Estate and Retail while those favoring hybrid work environments include Government, Education and Healthcare.
  • Most companies ‘encourage’ not ‘require’ the COVID vaccine: 49% of companies are encouraging all employees to get the COVID-19 vaccination; 27% are encouraging in-office employees to get the vaccination. Only 12% require the vaccine, and only 2% require those who are not remote to take the vaccine. Eighteen percent of employees say they would “quit their job” if their current employer required them to get the COVID-19 vaccination.

About the Research

TeamViewer commissioned an independent market research firm to survey a random sample of 200 decision makers in the U.S. spanning a range of industries and organizational sizes, including IT, legal, finance, marketing, HR, customer support, sales, facilities and other.  The study took place in February and March 2021 in partnership with TrendCandy research and Dynata, a global B2B panel provider. The study’s margin of error is +/-6.9% at the 95% confidence level.

About TeamViewer
TeamViewer is a leading global technology company that provides a connectivity platform to remotely access, control, manage, monitor, and repair devices of any kind – from laptops and mobile phones to industrial machines and robots. TeamViewer has more than 550,000 subscribers and enables companies of all sizes and from all industries to digitalize their business-critical processes through seamless connectivity. Since the company’s foundation in 2005, TeamViewer’s software has been installed on more than 2.5 billion devices around the world. The company is headquartered in Goppingen, Germany, and employs more than 1,300 people globally. In 2020, TeamViewer achieved billings of EUR 460m. TeamViewer AG (TMV) is listed at Frankfurt Stock Exchange and belongs to the MDAX. Further information can be found at www.teamviewer.com

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-35477
PUBLISHED: 2021-08-02
In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation does not necessarily occur before a store operation that has an attacker-controlled valu...
CVE-2017-18113
PUBLISHED: 2021-08-02
The DefaultOSWorkflowConfigurator class in Jira Server and Jira Data Center before version 8.18.1 allows remote attackers who can trick a system administrator to import their malicious workflow to execute arbitrary code via a Remote Code Execution (RCE) vulnerability. The vulnerability allowed for v...
CVE-2021-32066
PUBLISHED: 2021-08-01
An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the c...
CVE-2021-37759
PUBLISHED: 2021-07-31
A Session ID leak in the DEBUG log file in Graylog before 4.1.2 allows attackers to escalate privileges (to the access level of the leaked session ID).
CVE-2021-37760
PUBLISHED: 2021-07-31
A Session ID leak in the audit log in Graylog before 4.1.2 allows attackers to escalate privileges (to the access level of the leaked session ID).