Author Archive for: Amos Wambugu

Amos Wambugu

About Amos Wambugu

Tech salaries tend to go higher every year. And this tendency only grows with the increased use of digital platforms in our society. But this could change with the Covid-19 pandemic and everyone working remotely. Here is what you need to know to understand how the pandemic is impacting salaries. The Ongoing Debate Tech salaries […]

Tech salaries tend to go higher every year. And this tendency only grows with the increased use of digital platforms in our society. But this could change with the Covid-19 pandemic and everyone working remotely. Here is what you need to know to understand how the pandemic is impacting salaries.

The Ongoing Debate

Tech salaries for remote workers is a debate that has been going on for a while. Before, remote workers were few and far between. It wasn’t so common to hear about an issue with remote salaries. But what changed this year was the massive transition into remote working because of the pandemic. 

Before this year, the tech industry was completely reluctant to embrace remote work, even though tech professions are perfect for that modality. Their reluctance was because they believe that their team had to collaborate efficiently in the same location. But they didn’t have a choice this year, and it showed the sector how they could continue their operations remotely without a problem. 

Thus, the debate was born on how to compensate remote workers. Tech professionals generally live in tech hubs, where the cost of living is around 30% higher than the national average. With the pandemic, companies saw the benefits of having remote workers and offering this benefit permanently. With this opportunity, tech professionals are deciding to move to cities with cheaper cost of living. 

What tech corporations offer in exchange for remote working is that workers salaries are adjusted according to the new location. This could mean pay cuts of 10% to 30%. Some employees believe they shouldn’t receive a pay cut when they are doing exactly the same job. But the other side believes that they shouldn’t have the same salary as professionals that live in cities even 40% cheaper than where they live. 

It also creates the problem that every time companies want to hire someone new they will waste more time in calculating salaries and compensation. In the end, it will become easier to just set a number that is convenient no matter the location. And what will be the case of employees that want to work remotely for the opportunity to travel around the world?

Having a methodology of localized compensation complicates matters more than it resolves them. As already mentioned, it is an ongoing debate, and the industry hasn’t reached a definite solution. Each company right now is implementing its own way of calculating compensation, and we don’t know how that will impact salaries yet. 

More Competition

Remote working will also impact the industry by increasing competition from all sides. It means companies will have access to a wider talent pool because they can hire from anywhere in the world. And for the employees, they can apply to jobs from many more companies that are in other countries. 

Depending on how each company decides to calculate compensations, tech salaries could fluctuate a lot. A possible outcome is that tech salaries worldwide will be closer together, which will differ from how it is today. Salaries for tech workers are very different from Europe to the US and Latin America. Whether this competition will make salaries go up or down is still unclear. 

More Accessibility

Remote working will help increase accessibility in the industry. The tech sector is famous for lacking diversity, and many companies are trying to improve this issue. Remote working will help create more inclusive environments where disable people and stay-at-home moms can work from their homes’ comfort. 

For example, women are a minority in the industry, and many tend to leave their jobs behind when they become mothers because it doesn’t offer the flexibility they need. Remote positions will allow a web developer or data scientist the flexibility required to work and be a mother at the same time. 

In Summary

Remote working is changing the tech industry to the point where big corporations like Facebook are thinking of transitioning their team into fully remote modalities. How it will impact the salaries is still unclear, but they will probably continue to be higher than the national average even if they go down. 
Thus, if you are wondering if studying a tech profession is still worth it,  the answer is definitely yes. You will have a career that makes a real impact, and you will still have the awesome perks and benefits that come with working for a tech company. If you want to learn how you can become a tech professional without a degree, you can visit Bootcamp Rankings.

Read More
Cross-Site Scripting (XSS) XSS attacks are a type of injection where malicious code is injected into a web application by the attacker. This happens when the web application lacks mechanisms to validate user input from the browser. An attacker develops a code (script) that executes when the user is interacting with the web application. The […]

Cross-Site Scripting (XSS)

XSS attacks are a type of injection where malicious code is injected into a web application by the attacker. This happens when the web application lacks mechanisms to validate user input from the browser.

An attacker develops a code (script) that executes when the user is interacting with the web application. The browser has no way of differentiating genuine and injected code since the attacker will use a script that looks genuine but with the intention of changing the behavior of the web application.

The best practice to prevent XSS attack is to make sure that user input is validated before being submitted to the database and also allowing only authorized users in certain levels of the application.

Man-in-the-middle (MitM) attack

MitM attack happens when a hacker comes between a client and the server. A client may be using a browser to access an application and the hacker hijacks the communication between client’s browser and the network server.

A very common MitM attack is Session Hijacking – this attack occurs when a hacker hijacks a user’s session and substitutes the IP address making the server believe that it’s still communicating with right, trusted client.

Denial-of-service (DoS)

DoS attacks happen when hackers attack a network and prevent valid users from accessing resources of the network. This is done by sending multiple requests to the target machine in order to overload or overwhelm the system therefore making resources unavailable for the intended user.

Read More
Cyber-security is the practice of securing and defending computing devices and networks from malicious attacks. Often, cyber attacks are carried out with an aim of stealing information that can be used to for other crimes like fraud and impersonation. Cyber criminals usually use any security vulnerability they find on systems and therefore is the duty […]

Cyber-security is the practice of securing and defending computing devices and networks from malicious attacks. Often, cyber attacks are carried out with an aim of stealing information that can be used to for other crimes like fraud and impersonation. Cyber criminals usually use any security vulnerability they find on systems and therefore is the duty of the user of such systems to make sure that security is taken seriously and measures put in place to prevent attacks.

There are various types of attacks that are used by hackers to steal your information, below is a list of the major mechanisms, though there are so many of them and I may not mention all of them now.

Brute force Attacks

These are the type of attacks that happen when the attacker guesses multiple passwords and usernames until he/she penetrates to the system or application. The attacker may build and an application that combines many character combinations to try to guess what password you have used. You should make sure that you use strong passwords and NEVER use the same password to log in to different applications.

Do not you passwords that are easy to guess e.g your birthday, your child’s name, street name, name of favorite singer e.t.c. The best practice is to use a long password (at least 6 characters) with a combination of letters, numbers and special characters.

Phishing attack

Phishing is the practice used by attackers to lure users to reveal their personal information like passwords, user names, credit card numbers, PIN, phone numbers e.t.c. A phishing attack may come in form of an email designed to look like it comes from a reputable company or bank. The email will ask you to send some personal information so that you can access certain products or may be get an offer. Once you provide your information, the attacker will use it to log in to your accounts and may be steal your money using the credit card number you just provided.

To avoid these attacks, make sure you don’t randomly click on Ads and spam emails in your inbox. Make sure you have mechanism to filter away spam emails at all times. Also, avoid clicking on pop-up ads that come from random websites that you don’t even know about.

Malware

A malware is a software developed by attackers to steal information from your computer once it is executed or installed in your system. Normally, a malware is designed to look like a genuine program that you can download and install in your computer. Once installed, it can be used to access session or cookie data from your system. This cookie data has your information e.g saved usernames, passwords, name of the site visited, credit card numbers, items added to shopping cart e.t.c.

The attacker can use a malware program to access this cookie data and send it back to him/her which later is used to perform an attack.

To avoid malware in your system, make sure you have a good antivirus program to scan and protect your system. Also avoid downloading executable files from unsecure websites. Avoid clicking on random pop up Ads.

If you’d like to know more about different types of attacks, please read my post PART 2 of Cyber Security.

Read More
Hi there! Talk to us and we will get back to you as soon as possible.
Powered by