Connect with us

Cyber Security

10 posiciones laborales de alta demanda a partir de la pandemia

Published

on

10 posiciones laborales de alta demanda a partir de la pandemia

Randstad, líder global en servicios de Recursos Humanos, dio a conocer las 10 posiciones con mayor crecimiento a partir de la demanda laboral impulsada por la pandemia. Entre ellas se destacan: profesionales de marketing digital, perfiles de logística en eCommerce, expertos en usabilidad, desarrolladores, maquetadores web, especialistas en analítica de datos, project managers, expertos en ciberseguridad, representantes de atención al cliente y especialistas en higiene y seguridad laboral.

La crisis sanitaria ha revolucionado la manera en la que trabajamos y ha impactado en la dinámica del mercado laboral en todo el mundo. Muchos cambios y rutinas adquiridas durante los períodos más críticos de la cuarentena y el aislamiento han llegado para quedarse, tanto en lo que refiere a formatos y modelos de trabajo, como a nuevos patrones de consumo. Esta nueva realidad impulsa a su vez una mayor demanda de perfiles laborales asociados a los procesos de transformación digital y desarrollo de nuevos canales de comercialización y atención al cliente que las empresas han puesto en marcha a partir de una mayor incorporación de tecnología en sus procesos de negocio.

Sobre esta coyuntura, Andrea Ávila, CEO de Randstad para Argentina y Uruguay, afirmó: “Del mismo modo que la llegada de la pandemia ha identificado los trabajos considerados esenciales y los posibles de llevar a un formato de home office, la demanda laboral también ha cambiado en parte su configuración, con posiciones que desaparecieron y otras que tuvieron una demanda extraordinaria. Desde ya, todos los perfiles asociados a las diferentes ramas de la tecnología, que ya venían con un descalce creciente entre la oferta y la demanda mucho antes de la crisis sanitaria, pero también los vinculados al crecimiento del comercio electrónico y los canales de atención no presencial”.

Estas son las 10 posiciones identificadas por el equipo de especialistas en reclutamiento y gestión del talento de Randstad que más han crecido en el mercado local como producto de la demanda laboral asociada a la pandemia:

Marketing Digital: A partir de la llegada del coronavirus, la mayoría de las organizaciones ampliaron su pisada en el mundo online y muchas debieron hacer sus primeros pasos en el entorno digital. Los perfiles en marketing digital -en todos sus niveles de seniority- se convirtieron en el talento clave para la planificación, coordinación y ejecución de las estrategias digitales de emprendedores, comerciantes y compañías de todos los tamaños y sectores, demandando profesionales para cubrir puestos como responsables de marketing online, community managers, especialistas en posicionamiento de marca, analistas SEO y SEM y redactores de contenido, entre otros.

Logística en eCommerce: Con la imposibilidad de realizar compras presenciales que impuso el confinamiento, los comercios tradicionales se vieron obligados a adaptar su negocio a un formato virtual, con el enorme potencial de desarrollo que esto supuso. Así, desde PyMEs y emprendedores hasta grandes empresas, demandan día a día personal especializado en clasificación y armado de pedidos, así como profesionales de logística para la gestión de centros de almacenamiento y distribución de productos, con el objetivo de potenciar sus canales de comercio electrónico.

Experto en Experiencia/Interfase de Usuario (UX/UI): Con el traspaso de la experiencia de compra y consumo del mundo offline al entorno virtual, el mercado cada vez ofrece más opciones de productos y servicios que compiten por la atención de clientes y usuarios, motivo por el cual el experto en UX/UI se ha convertido en uno de los puestos más requeridos de los últimos meses. Se trata de una figura clave para conectar al usuario con un producto y lograr su satisfacción, tanto con el producto o servicio adquirido como con el proceso y experiencia de compra.

Desarrollador front-end y back-end: En un mundo que se ha volcado casi en su totalidad al formato digital, los desarrolladores de aplicaciones son altamente solicitados, tanto los especializados en “front-end” como en “back-end”. Los primeros tienen la responsabilidad de desarrollar la parte del software que interactúa directamente con los usuarios, mientras que los segundos con los sistemas que procesan la información.

Programador/maquetador web: Si bien es una disciplina que lleva muchos años en el mercado con alta demanda, se trata de una posición que ha tenido un nuevo pico dado que en la actualidad la presencia online ha dejado de ser opcional. Diseñadores, maquetadores web y especialistas en gestión de contenido (CMS) son algunas de las posiciones que sostienen la presencia online de las empresas y sus canales institucionales y comerciales en el mundo virtual.

Data Science/Ingeniero de datos: Mayor digitalización significa una mayor posibilidad de capturar datos transaccionales que pueden ser procesados para mejorar la toma decisiones de negocio. Con la analítica de datos las empresas buscan ser más competitivas y ágiles, encontrar tendencias en los conjuntos de datos y desarrollar algoritmos para ayudar a que la información sin procesar sea útil para impulsar el negocio. Se trata de perfiles con formación en matemáticas, estadística o programación que se han especializado en esta nueva disciplina que ha tenido un crecimiento exponencial en los últimos dos años.

Project Manager: La necesidad de adaptar los procesos y herramientas que sostienen la productividad de las empresas en el entorno extremadamente difícil que forzó la pandemia fue determinante para impulsar una mayor demanda de profesionales para la gestión de proyectos. Se trata de perfiles analíticos que tienen la responsabilidad de coordinar el trabajo de los equipos de proyecto para cumplir los objetivos y hoy, en un contexto cambiante y con liderazgos remotos, llevar adelante esta posición es todo un desafío.

Experto en ciberseguridad: La digitalización de los puestos de trabajo, el home office masivo y la migración a canales virtuales han expuesto a las organizaciones y a sus sistemas como nunca antes. Con la toma de estado público de resonantes casos de hackeos, secuestros y robos de información y otros incidentes de seguridad, la demanda laboral de perfiles especializados en seguridad de la información se ha multiplicado en todo el mundo. Se trata de profesionales con una altísima especialización técnica que tienen la responsabilidad de proteger tanto la infraestructura como los datos de las organizaciones, así como hacer frente y dar respuesta a los incidentes en un contexto de mayor exposición por la digitalización y el avance de la ciberdelincuencia.

Representante de atención al cliente: Un mucho menor peso de la presencialidad en los procesos de contacto de las empresas con sus públicos disparó la demanda de todos los roles asociados a la atención al cliente por la criticidad y complejidad que la virtualidad ha sumado a la tarea de satisfacción y fidelización de clientes y usuarios. Se trata de perfiles en los que se valoran particularmente las habilidades blandas como la capacidad de escucha, la empatía y la orientación hacia la resolución de problemas.

Especialista en higiene y seguridad laboral: El avance de la pandemia y la necesidad de mantener la productividad en los ámbitos de trabajo en las empresas esenciales en los primeros meses del confinamiento, y luego en la gran mayoría de los sectores e industrias, puso en prioridad la necesidad de velar por la salud de los trabajadores. Acompañando este proceso que incorpora la salud y el bienestar de los colaboradores entre las responsabilidades primarias de las organizaciones, la demanda de profesionales con formación y experiencia en la elaboración de protocolos de salud y seguridad ocupacional creció  de manera exponencial durante el último año y medio.

“Las restricciones que impuso la pandemia impulsaron la búsqueda de nuevas formas de organización del trabajo para el sostenimiento de la productividad de las empresas, y con esas nuevas formas surgen también nuevas demandas laborales, que tienen que ver tanto con conocimientos y saberes técnicos, como con habilidades socioemocionales sobre las que hay que tomar nota para formar a los jóvenes para los trabajos del futuro”, agregó Andrea Ávila.

PlatoAi. Web3 Reimagined. Data Intelligence Amplified.
Click here to access.

Source: https://www.fintechnews.org/10-posiciones-laborales-de-alta-demanda-a-partir-de-la-pandemia/

Cyber Security

How to Sell Cybersecurity

Published

on

How to Sell Cybersecurity- We spoke with professionals to learn how they presently offer cybersecurity and information security goods and services to their clients.

Let’s look at seven of these tried-and-true ways that you may use right now:

Understand the Requirements of Different Industries

Different sectors have their own set of standards and compliance regulations to adhere to. For example, the security procedures that a healthcare organisation must follow are vastly different from those that a law firm or accountant should consider.

Your offer will most likely differ depending on who you’re selling your cybersecurity services to.

As a result, it’s critical for cybersecurity companies to understand the verticals in which they market.

You know more about security than they do, so research the laws and regulations for yourself. Find out what particular firms are needed to do, and whether their location has an impact on what is required.

You’ll be able to segment your prospects into separate lists more easily after that.

You can construct Smart Views in Close, for example, that automatically group leads together depending on your criteria. As a result, you can establish divisions based on industry, region, or any other significant feature. You may quickly change and amend those criteria, and your dynamic lead lists will update in real time.

Build and maintain a wide network online and offline

Your prospects are continually inundated with messages from a variety of sources, some of which are genuine and others which are spam.

So, how do you get others to pay attention to you? In a world of “spammy” security messaging, how can you stand out as a legitimate solution?

According to Magda Chelly of Responsible Cyber,

Making connections and maintaining relationships with your customers can be the key to success for most businesses. By continuously building a network of colleagues, business partners, and more, you are ensuring that whenever you need a strong pipeline and a definite lead, you can call upon your network to help you. One of my colleagues mentioned, you build relationships when you are interested in people, not when you make people interested in you.

It’s critical to be real whether you’re building your network online or offline. If you’re a salesperson who isn’t. You sell your prospect on yourself by selling nothing.

Apozy’s Rick Deacon adds, “Genuine, valuable information and good dialogue can lead to a new client.” “The issue is that individuals are phoney and ‘market-y,’ and it doesn’t work for them. It’s crucial to be someone who others want to talk to.”

You could, for example:

  • Use LinkedIn to share useful material.
  • Attend (or host!) a virtual event in your field.
  • Interviews on podcasts and shows hosted by notable people in your field are a great way to get your name out there.

Provide material that starts fresh dialogues and helps you extend your network to draw your audience to you. Make yourself the person people want to speak with.

Become an Educator and Security Consultant

You’ll be in a better position to educate your prospects after you understand the various security standards that different sectors must follow.

Many firms are unconcerned about protecting themselves from cyberattacks, but they recognise the necessity of adhering to regulatory rules. They’re probably aware that they’re not well-informed.

That’s where you, as the hero, come in: you can assist them cut through the legalese and figure out what’s really expected of them.

You establish yourself as an information security specialist by serving as an advisor and lecturer. This strategy helps you create trust with your prospects, and they’ll likely recognise they need your support on their own.

Ask Questions that Reveal Needs they didn’t Know they had

People, on the whole, despise being told what to do or what they require.

So, rather than trying to persuade or persuade your prospects that they require better security solutions, ask them questions to enable them arrive to their own conclusions. You could, for example, ask queries like:

  • Are you up to date on your industry’s regulations?
  • Are you safe from internal dangers and unintentional leaks?
  • How safe is it for you to share documents and communicate internally?
  • How do you deal with security issues posed by remote workers?
  • Do you have a plan in place to deal with an incident?

You can help your prospects recognise they aren’t entirely prepared for the hazards by discussing these and other questions.

They’ll be more receptive to hearing about your options after that.

Concentrate on how Your Product Helps them run their Business

Remember that fear tactics don’t work in real life. Instead of using fear to sell your goods or service, utilise value.

As a result, you’ll be able to focus less on what you do and more on what it accomplishes for them.

Here’s what Responsible Cyber’s Magda Chelly does:

I summarize the benefits and value of the product that I am offering using regulatory requirements and use cases. This usually works in our industry, as depending on where the customers are, the awareness might be very different.

In the field of cybersecurity, use cases and case studies can be extremely useful. Because your prospects may not fully comprehend their demands or what they can achieve with your product or services, it is your responsibility to offer them real-world instances of the outcomes they could expect. This is a great storytelling technique that can assist you in closing more business.

Use use cases that are relevant to their industry to help them reach that “aha” moment.

Keep their Priorities in Mind

When it comes to security, each company has its own priorities and objectives. Perhaps they wish to give their consumers more trust by adopting infosec products or services to better protect their data. Perhaps they don’t want to get fined if they don’t follow the rules. Perhaps they’re looking for ways to keep a newly remote crew safe.

Before you start pitching, you should figure out what this prospect’s top priorities are.

Consider how you may begin your pitch by emphasising the need of printer security. After a few minutes of talking, you learn that this prospect has lately transferred the bulk of their teams to the cloud and has eliminated the majority of their printers. Security solutions for their remote staff were what they really required.

Don’t be that person.

Instead, concentrate on their priorities first, then build your proposal around their company. This will not only save you time and efforts, but it will also increase your chances of piqueing their attention.

Don’t be Frightened to show your Vulnerability

Is it true that you can guarantee 100 percent security?

Come on, now, tell it how it is.

If your prospects are familiar with cybersecurity, they understand that there is no such thing as 100 percent security. If that’s all you have to offer, you’ll quickly lose any trust people had in you.

Instead, make an effort to be vulnerable.

Here’s what Apozy’s Rick Deacon has done:

We close deals by being vulnerable and upfront with our product’s efficacy and execution. To prove you can do what you say, you need to show a technical person what it does, how it does it, and what the real outcome is while not pretending you fix every problem they face.

Pretend you’re a silver bullet who can solve any security issue that arises. Even if a prospect isn’t familiar with cybersecurity, they’ll recognise that something that seems too good to be true almost always is.

So, be truthful and true to yourself. Make it clear to your prospects that perfect security isn’t a realistic aim. Demonstrate how you can assist them in anticipating dangers and being prepared to fight or respond to cyberattacks. In sales, practise radical candour.

The post How to Sell Cybersecurity appeared first on Cybers Guards.
PlatoAi. Web3 Reimagined. Data Intelligence Amplified.
Click here to access.

Source: https://cybersguards.com/how-to-sell-cybersecurity/

Continue Reading

Cyber Security

Android Banking Trojan Relies on Screen Recording and Keylogging Instead of HTML

Published

on

According to security experts at ThreatFabric, a newly found Android banking Trojan captures login credentials via screen recording and keylogging rather than HTML overlays.

The malware, dubbed Vultur and originally discovered in March 2021, uses AlphaVNC’s VNC (Virtual Network Computing) implementation to get full visibility into the victim system. Remote access to the device’s VNC server is provided by ngrok, which uses secure tunnels to expose endpoints behind NATs and firewalls to the Internet.

According to ThreatFabric, the mobile malware uses Accessibility Services to identify the programme running in the foreground and begins screen recording if the app is in the target list. Vultur is projecting the screen while masquerading as a programme called Protection Guard, an operation visible in the notification panel.

While Android banking Trojans are known to use the Accessibility Services to carry out criminal operations, they often use HTML overlays to deceive users into exposing their login details. Vultur does use overlay to get all of the permissions it needs to execute unimpeded on the infected device.

The malware also makes advantage of Accessibility Services to log all of the keys that the user taps on the screen and to prevent the victim from manually uninstalling the infection. The virus auto-clicks the back button to return the user to the main screen when the user accesses the app’s information screen in settings.

Vultur is a banking application that primarily targets consumers in Australia, Italy, and Spain. Some victims were also seen in the Netherlands and the United Kingdom, but to a considerably smaller extent. The malware is also highly interested in stealing crypto-wallet credentials and keeps a close eye on social networking apps.

Vultur looks to be tied to Brunhilda, a privately managed dropper that previously transmitted Alien, a variant of the Cerberus banking malware that was discovered in Google Play several months ago, according to ThreatFabric.

The Brunhilda sample connected with Vultur (it has the same icon, package name, and command and control server as a Vultur sample) has over 5.000 instals, out of a total of more than 30.000 Brunhilda droppers are estimated to have had through Google Play and unofficial stores.

The post Android Banking Trojan Relies on Screen Recording and Keylogging Instead of HTML appeared first on Cybers Guards.
PlatoAi. Web3 Reimagined. Data Intelligence Amplified.
Click here to access.

Source: https://cybersguards.com/android-banking-trojan-relies-on-screen-recording-and-keylogging-instead-of-html/

Continue Reading

Cyber Security

Chinese-Speaking Threat Actor Targeting Microsoft Exchange Vulnerabilities

Published

on

According to Kaspersky, a previously unknown Chinese-speaking threat actor is targeting Microsoft Exchange vulnerabilities in an attempt to compromise high-profile victims.

The long-running operation known as GhostEmperor concentrates on Southeast Asian targets and employs a previously unknown Windows kernel-mode rootkit.

According to Kaspersky, GhostEmperor uses a loading technique that relies on a component of the Cheat Engine open-source project to get around Windows Driver Signature Enforcement and install its rootkit.

Kaspersky security researchers uncovered the use of “a sophisticated multi-stage malware framework targeted at allowing remote control over the infected machines” during their examination into the activities.

The threat actor targeted various entities in Southeast Asia, including governmental organisations and telecom companies, according to Kaspersky. The toolset first appeared in July 2020, with the threat actor targeting various entities in Southeast Asia, including governmental organisations and telecom companies.

While looking into numerous efforts targeting Exchange servers, Kaspersky discovered the GhostEmperor cluster of activity.

Several threat actors targeted a set of Exchange vulnerabilities that Microsoft publicly reported in March this year, with the majority of the attacks being blamed on Chinese opponents.

Last Monday, the US and its allies publicly accused China of the assaults.

GhostEmperor, on the other hand, is a wholly new adversary, according to Kaspersky, with no resemblance to established threat actors.

“GhostEmperor is a great example of how fraudsters are always looking for new ways to exploit weaknesses and new strategies to deploy. They added additional issues to the already well-established trend of assaults against Microsoft Exchange servers by using a previously unknown, sophisticated rootkit,” said David Emm, a security analyst at Kaspersky.

The post Chinese-Speaking Threat Actor Targeting Microsoft Exchange Vulnerabilities appeared first on Cybers Guards.
PlatoAi. Web3 Reimagined. Data Intelligence Amplified.
Click here to access.

Source: https://cybersguards.com/chinese-speaking-threat-actor-targeting-microsoft-exchange-vulnerabilities/

Continue Reading

Cyber Security

Guardicore Labs are Sharing Details of a Critical Vulnerability in Hyper-V

Published

on

Microsoft addressed a significant vulnerability in Hyper-V in May 2021, according to security experts at Guardicore Labs.

The security vulnerability, identified as CVE-2021-28476 with a CVSS score of 9.9, affects Hyper-virtual V’s network switch driver (vmswitch.sys) and might be used to gain remote code execution or create a denial of service scenario.

Microsoft employs Hyper-V as the core virtualization technology for Azure. Hyper-V is a native hypervisor that provides virtualization features for both desktop and cloud systems.

Because it first surfaced in a vmswitch build in August 2019, the security flaw found by Guardicore Labs (in partnership with SafeBreach Labs) was likely in production for more than a year. Windows 7, 8.1, and 10 are all affected, as well as Windows Server 2008, 2012, 2016, and 2019.

By delivering a forged packet to the Hyper-V host, an attacker with an Azure virtual machine might exploit the security flaw. As a result, the attacker might have run code on the Hyper-V host, potentially bringing down entire cloud regions.

“Because Hyper-V is Azure’s hypervisor, a vulnerability in Hyper-V also affects Azure, and can compromise entire regions of the public cloud. According to a Guardicore Labs research, “triggering denial of service from an Azure VM would crash significant elements of Azure’s infrastructure and knock down all virtual machines that share the same host.”

According to the security researchers, an attacker who is able to exploit the vulnerability to gain remote code execution – a more complex exploitation chain – could gain control of the host and the VMs running on it, gaining access to sensitive information and the ability to run malicious payloads or perform other nefarious operations.

The problem exists because vmswitch does not validate the value of OID requests before processing them, and so may dereference an invalid pointer.

According to Guardicore Labs, there are two exploitation scenarios: one in which an incorrect pointer causes the Hyper-V host to crash, and another in which the host’s kernel reads from a memory-mapped device register and executes code.

“What made this vulnerability so fatal was the combination of a hypervisor bug – an arbitrary pointer dereference – and a design defect allowing an overly permissive communication channel between the guest and the host,” the researchers explained.

The post Guardicore Labs are Sharing Details of a Critical Vulnerability in Hyper-V appeared first on Cybers Guards.
PlatoAi. Web3 Reimagined. Data Intelligence Amplified.
Click here to access.

Source: https://cybersguards.com/guardicore-labs-are-sharing-details-of-a-critical-vulnerability-in-hyper-v/

Continue Reading
Gaming1 hour ago

How to master poker

Gaming7 hours ago

SCCG Management and Data Sports Group Partner to Deliver Sports Content and Analytics to the Media Industry

Ecommerce1 day ago

How professional videos can help e-commerce brands attract more customers

Cyber Security2 days ago

How to Sell Cybersecurity

Cyber Security2 days ago

Android Banking Trojan Relies on Screen Recording and Keylogging Instead of HTML

Blockchain2 days ago

The GBA Annual Achievement Awards

Energy2 days ago

CEMIG Geracão e Transmissão S.A. Announces Early Tender Date Results of its Cash Tender Offer for its 9.250% Senior Notes due 2024

Esports2 days ago

Tribes of Midgard Berserker: How to Unlock

Esports2 days ago

Tribes of Midgard Berserker: How to Unlock

Esports2 days ago

Can You Play King’s Bounty 2 on PlayStation?

Esports2 days ago

Can You Play King’s Bounty 2 on PlayStation?

Energy2 days ago

Coding And Marking Equipment Market in Industrial Machinery Industry to grow by USD 1.45 billion | Technavio

Esports2 days ago

Is King’s Bounty 2 on Xbox Game Pass?

Esports2 days ago

Is King’s Bounty 2 on Xbox Game Pass?

Energy2 days ago

CATL dévoile sa dernière technologie de pointe en lançant sa première génération de batteries sodium-ion

Energy2 days ago

CATL anuncia a sua tecnologia inovadora mais recente ao lançar a sua primeira geração de baterias de íons de sódio

Esports3 days ago

Can You Preorder King’s Bounty 2?

Esports3 days ago

Can You Preorder King’s Bounty 2?

Esports3 days ago

League of Legends’ Champion Vex: Everything You Need to Know

Esports3 days ago

League of Legends’ Champion Vex: Everything You Need to Know

Fintech3 days ago

Chilean Fintechs Secure Millions; EBANX and Amazon Forge Payments Partnership

IOT3 days ago

Edge ML on the Raspberry Pi: Remote Birding and Traffic Monitoring

Fintech3 days ago

Movers and Shakers: Finastra hires new payments lead, Credit Suisse onboards tech chief

AR/VR3 days ago

Competition: Win A Township Tale for Oculus Quest

Fintech3 days ago

Listen: How the FDIC and Duke University drive bank innovation

Fintech3 days ago

State Street to offer crypto services to private-fund clients

AR/VR3 days ago

The VR Drop: Brutal Parkour Golf

Cyber Security3 days ago

Chinese-Speaking Threat Actor Targeting Microsoft Exchange Vulnerabilities

Blockchain3 days ago

Happy birthday Ethereum!

AI3 days ago

Why Machine Vision Matters to Your Business

Trending