Permanent Work From Home – New HR Contract Model

The most trending HR employee contract model now includes “Work from ANYWHERE” apart from the usual “Permanent |  Full-Time | Causal | Part-Time | etc.” This model essentially allows employees to choose whether they want to be full time at the Office | Home | Office and Home.

Spotify is the latest tech company which has recently adapted this model. The company will adhere to implementing extreme flexibility even around locations, giving employees the freedom to even choose the country and city where they would like to work from. The company has decided to provide co-working space memberships for its employees who choose to work remotely and at the same time desire for a dedicated workspace. Hence, giving them the best of both worlds!!!

We are seeing more and more big-scale companies adopting the remote work model as a more permanent and concrete option due to adversities caused by the Covid-19 pandemic. This framework will give more assurance to companies in leading a more persistent growth. 

With this dynamic shift in workplace concept, companies are at the forefront of reassessing their office spaces across the globe for increased perseverance, flexibility and prosperity to ensure that all of their operations, regardless of the situation, goes on unobstructedly, comfortably and efficiently. The main objective of this new employee roadmapping approach is to ensure that employees in the uncertain long-run have a permanent & backup place where they can perform with focus, collaborate without obstruction, innovate and recreate and the possibility of this should prevail whether at an office/home desk, in a conference room, a cafe or a co-working space.

Spotify is not the only tech company, there are other significant companies like Microsoft, Salesforce, Twitter, Square, etc. who have considered and implemented this dynamic employee contractual setting. Salesforce recently announced to let its employees choose whether they would consider coming into the office again? While Simultaneously emphasizing that the 9-to-5 workday routine is dead. Square and Twitter are letting employees work from home #wfh FOR GOOD! And lastly Microsoft also offered its workers high flexibility to work from home.



As evidently seen that we have a rising number of companies who are proactively considering remote work as a more permanent option due to the Covid-19 pandemic. I think it is time that all companies should prepare for the same and evolve with the changing time. The world is not the same anymore. In this world only the digitally adept will survive. @CloudPloys we help companies in upscaling and proofing their business against such adversities, so please reach out for a consultation and a relaxed discussion! 

Building technology for success in digital era

ZipPay VS Afterpay – How are the two different or similar?

When we talk about buying shares the two most trending shares these days are those of Zip and After pay. But the business models of both are similar that it is hard to identify a clear distinction between the two. The buyers often cannot make a clear comparison between the two.

So here we have listed out a few key features for both:

What does the company offer? Offers buyers an instant credit of $1000 for buying products. It can be redeemed in online or other purchases. The user has the flexibility to decide their instalment repayment plan. Most flexible! Offers buyers to buy now and pay later with four split payments in equal portions deducted fortnightly from the registered credit/debit card. Most convenient! 
Buying Limit Offers an instant shopping credit of $1000 without any need for an initial deposit at the time of purchase. For any order greater than the $1000 value the buyer needs to pay the difference upfront. Offers a total transaction of up to $1000 with the first quarter payment payable by the buyer at the time of purchase. 
Fees & Charges No fee incurred if instalment is paid on time. 0% interest & $0 set up. No fee incurred if instalment is paid on time. 0% interest & $0 set up.
Late or Missed Instalment ChargesCharges $5/month after the first month for any outstanding amount irrespective of how big or small the amount is. 
This means if you pay off before the end of the first month you will never be charged a fee!
Charges $10 for a late payment. However, they do send follow-up reminder emails ahead of time. 
This means if you pay on time you will never be charged a fee!
Summarised Distinction Flexible process, no deposit required Simpler process and get to pay off faster. 
User Eligibility Only available for Australian Citizens and Permanent Residents over 18 years old. Only available for Australian Citizens and Permanent Residents over 18 years old. 
Bank Card Requirements A user must have a valid debit card and be employed with a minimum salary of $300/wk A user must have a valid credit/debit card and sufficient funds to cover the first quarter instalment.

These are the few clear distinctions which might support you in decision making amongst two crucial companies. @CloudPloys enjoy exploring such exciting & enriching topics. So if you are someone like minded and enjoyed reading this blog then stay attuned for more topics yet to be explored! 

Building technology for success in digital era

Is your business COVID proof? Can it survive recurring lockdowns?

Take your business ONLINE before the lockdowns take them OFFLINE!!! @CloudPloys

Melbournians were truly taken aback with the fourth lockdown with coffee & food culture being the charm of the place this recent lockdown announced on 11th February, 2021 affected the cafes & restaurants quite impactfully especially with Valentines weekend being round the corner…who knew that on Valentine’s day I would be writing a blog instead of going out for a sunny date out?

The adversity of these state restrictions sinks quite deeply into the education industry, hospitality and recreation sectors but this is something not even the Victorian Government can knowingly help but you surely can…by doing your business a favour and transitioning ONLINE as much as possible. It is understandable that there are few aspects of the business which cannot be virtual but it is better to have a cloud shield for those operations where possible.

Regardless of the fact that we are heading to something called a “New Normal” era but the uncertainty around the world with respect to such viruses can never give a surety of a definite normal. There are still some businesses for whom digital transition will be a challenge as they would not be able to speculate that which operations can actually be done online and this is where @CloudPloys come in. We listen, analyse and present you with strategic and COVID proof business solutions. We do the thinking for you, you just have to reach out!

Take example of this lockdown we know it is going to last for 5 days but are we confident that it won’t get extended ?? In a situation where the government is not certain what is coming ahead how can we as individuals have our own speculations?

Therefore, it is utterly vital that we proof our business and be ready for anything that comes at us. As a responsible business it is your liability to take the first step and as an expert it is our responsibility to give you a viable solution.

Building technology for success in digital era (2)

Cybersecurity Dilemma – Securing Internet of Things (IoT) Networks

There is a growing concern around maintaining a reliable system to play a particular sound track, place an online order by just saying “Hey Siri” or “Hey google”, have your refrigerator detect your food stock, or have your office printer depict its own service automatically.

These tech advancements are driving a growing popularity for “SMART” everything from offices, homes, appliances, buildings & cities. Where all these are connected through the “Internet of Things” (IoT).

IoT is the network of objects, physical in nature which are equipped with sensors, software and other technologies for transmitting data with other devices & systems through the internet. These incorporate immersed systems, wireless sensor networks, controlled & automated systems like smart home devices, as well as smart phones & speakers.

The exploding number & heterogeneity of devices linked to IoT networks is causing an excruciating difficulty to implement cybersecurity, because each device adds to be a potential weak link. 

For more insight, a range of devices include toys, exercise machines, gaming devices and connected cars. And the risk revolving around it could be a possibility of hacking a large number of interlinked cars to shut down cities via deadlock.

Furthermore, smart buildings & cities can also be hacked by getting into automated systems that control ventilation & temperature control systems, fire alarms and other essential foundations. These threats elaborate to the household, hospitality and healthcare industry. 

So if a sector as a whole is exposed to such compromise then where does this lead the individual businesses to? Evidently we have seen a move among enterprises towards adopting a “risk-based” approach to cybersecurity.

This approach to information security lets enterprises pursue strategies specific to their custom operating domain, threat exposure and objectives, this is what we term as enterprise risk management (ERM) strategies widely adopted by several enterprises. But the problem lies where the enterprises have an extremely high tolerance for risk. Since it is commonly acknowledged that there is no such thing as a fully secure system therefore, it is vital to ensure that there’s proper care taken while designing system architecture rather than using this as an excuse. 

But since an enterprise makes their own informed choice they should have an accountability for it as well!? However, there is a lot more to think about than simply holding enterprises responsible. So instead of contemplating on who to blame the thought process should rather be directed in making the IoT networks more secure. 

There are a few recommendations for it like:

  • One is to exert a device foundation to get an informative, latest inventory of the count and variety of devices connected to one’s IoT network. Along with an accountability of their risk profiles, and their trusted conducts. 
  • Another one could be to outline one’s network to contain IoT devices in their own pool of controlled & closely knit security zones, keeping them separate from the other IT assets.
  • Also, the adoption of strong password settings by replacing the default ones of newly connected IoT devices with highly secure ones. Hence, complying to enterprise password policies.
  • Furthermore, on-going patching and updating of codes when feasible could be a risk combination tactic whilst proactively monitoring IoT devices at all times.

Securing IoT networks requires a mix of procuring products that are designed whilst taking a wholesome approach to security. Developers of such products can no longer just be concerned about safeguarding and connecting some particular IT networks. Rather, they must contemplate the consequences about the entire security of the cyber & other tangible systems. 

@CloudPloys accounts for all the foreseeable risks around IoT networks. We work ethically and put relentless efforts to provide a streamlined experience to our associates. As awareness of such risk exposure is the first step towards combating it.