The workplace post covid- what will be our new normal?

The global Covid-19 pandemic has affected regular working operations the world over, and Kenya
is no exception.
As the crisis continues to wreak havoc worldwide, organizations have come to the realization that
this is a situation that they have to live with and reconsider how service delivery and other
company operations will continue within the set restrictions.

How do we sustain operations while ensuring the safety of our employees and our

Some employers are looking at new ways of working, while ensuring their goals and objectives are
not compromised.
Big corporations such as Twitter, Facebook, and Google, to name a few, have indicated that their
staff may work from home permanently or for as long as they wish.
This model has been adopted as employers have become aware that work productivity is not
necessarily measured by the number of hours one puts in within a day while in the office
Businesses are looking at this as an opportunity to use physical and virtual collaboration tools to
test a blended work environment.

But what of organizations that require face to face interactions for their service delivery:

For these organizations, alternative working patterns have to be adopted to help reduce employee commutes as well as observing social distancing measures and other guidelines that have been put in place by the Ministry of Health.

These companies may rotate their staff or have them work from home, aided by a stable internet connection, technology and video-conferencing platforms such as Zoom and Google Meet and other secure online meeting applications. This will ensure continuation of service delivery, without compromising the service levels.

What will be our new normal?
  1. The new normal for companies will involve shifting towards digitizing operations to enable remote working.
  2. Companies will need to re-evaluate and re-organize their office spaces as well as their daily office operations.
  3. They will need to quickly learn and adopt emerging best practices while realigning business
    processes to the new ways of working.

In normalizing remote working, companies have to ensure that the following points have been

  •  Is your workforce able to efficiently interact with and support your clients remotely without
    any challenges?
  • Can you ensure that company data is safe?
  • Does the staff have the adequate tools to ensure business continuity?
  • How does an organization plan on keeping the remote worker engaged, to ensure there’s no
    drop in productivity?
  • As remote working may become our new reality, organizations need to engage their workforce with
    continuous training programs, imparting them with skills that are relevant for the times ahead.
  • Companies must invest in technology that will ensure they remain connected with their staff as well
    as those they are in business with.
  • Every beginning has an end; Some conclusions are predictable and some, quite unpredictable.
    This crisis had its beginning, it will come to an end in the unforeseeable future, but its effects will
    remain imprinted in our work environment for years to come.


Author: Miss Iris Kalibo |

Assistant to the Director |

MyISP Limited.

Email Security Protection

Well, if you are like me, before taking my Certified Ethical Hacker class, probably maybe not as much as you should and for some, I know it’s never. If you have never taken a class or have some basic knowledge of keeping yourself safe online, you might as well consider yourself hacked. In this digital age where most of our communication is done online, we are always at risk of losing our most precious asset, our Personal Identifying Information (PII). This is the information that we usually guard and keep close to ourselves such as, PIN numbers, email passwords, your bank account login credentials and the like.

What if I told you that I would make you give me this information willingly and you would actually be smiling as you do it. What, you don’t believe me, well you probably already did give it to someone other than me.

We’ve all at one time or another received a phishing email. It goes something like this, Your mailbox is full, click here to add more space, we noticed some irregular activity on your bank account, click below link to confirm, You have won the lottery, click below to redeem your prize. This will usually lead you to a similar site to what you are used to, for instance your bank’s site or your email login page and you will proceed to enter your credentials. Guess what, you’ve already been hacked. The sites you visit by clicking on the links in the email are usually fake sites that are used to harvest user credentials which ultimately let the crooks gain access to your account. I see you, “smart guy” asking who in this day and age writing paper still clicks on such emails, well of all phishing emails sent, there is a success rate of 30%, meaning that there are still so many users who are not aware of this kind of scams. I still see you brushing me off there, well guess what, internet giants Google and Facebook got duped out of $100 million through an email phishing scheme when a hacker impersonated a computer-parts vendor.

Phishing is still one of the most successful hacking techniques used to this day categorized under social engineering attacks.The hacker always tends to pose as someone you can trust and often tricks you to clicking on a link in the email. This kind of attack has been used to gain access to government institutions, and corporate organizations.

So what can you do to keep yourself safe online even with the hackers and crooks getting better at it everyday?

  1. Always be suspicious
    My wife’s motto on trust is, “You have to prove you can be trusted, before I trust you”. This is what I would advise when it comes to emails. This is even with emails you think you know the sender.
  2. Pay attention to the email/web address
    If you look keenly at the email and web address on a phishing email, you will see a lot of similarity but there is always something that will let you know the site or email address is not legitimate. E.g.,,
  3. Urgent action required
    Phising emails will most of the time have a sense of urgency on the action they want you to take. Always stop and ask yourself, why the urgency? You will more likely than not see phrases like, “Your account will be closed”, “Your account has been compromised or “Urgent action required”.
  4. Seek professional consultation
    MyISP offers user training to sensitize staff members on security issues and things to look out for when conducting their everyday duties. You can get in touch with us for more on this.

To find out how we can help you email us on or give us a call on 0730911000

Article Written by: Wilson Muroki
Service Delivery Manager – MyISP Ltd
BSc Information Systems Technology
Certified Ethical Hacker (CEH) ~ Institution: EC Council