• 0 Posts
  • 11 Comments
Joined 1 year ago
cake
Cake day: July 3rd, 2023

help-circle







  • Why RTO makes sense,

    People working at companies like Zoom typically get large sums of RSUs. These RSUs typically start to vest at 1 year and then continue to vest for 2-3 years. By forcing people to go into the office, some of these people will leave, forfeiting any non-vested RSUs. This allows companies to do layoffs without the cost associated.

    Salary. These companies will just hire new bodies with lower salaries and higher RSU packages that will vest over longer time with the goal of saving money in the immediate now that debt is no longer cheap.

    Training/Mentoring require more effort remotely.

    Corporate real estate.

    Why RTO doesn’t make sense,

    Many companies like Zoom have offices scattered across the country. The tech company I work for, for example, me and 3 colleagues are the only ones near my local office in a team of 80. My manager is in another state and most of my 80+ member team are in other states or countries (follow the sun posture). Any internal meeting I have to have would have to be done over Zoom.

    Consultant companies like PWC are doing much more consultant hours virtually instead of traveling to clients because clients don’t want to spend the extra billable for the travel, which is a key indicator that remote work isn’t the detriment that it’s being made out to be.

    Open office floor plans make productivity worse.

    .

    Personally I will never take a job again that requires office time, I much prefer meeting up with coworkers for dinner every couple months over forced “teambuilding”



  • Personally I trust Bitwarden more than myself to keep all my passwords secure AND available. They’ve got a good track record as far as I’m aware.

    For general security hardening though…

    I use Shodan to help me identify if anything is misconfigured and what is visible from the web. You can pick up an account for usually $1 for life when they run a deal, then you can just monitor your DDNS, domain, and IP address and have it email you when any new services are detected.

    Cloudflare Tunnels, to remove the need for a nginx reverse proxy (with the added benefit of easy failover as well as simplifying your stack). Then I’m utilizing Cloudflare’s WAF to handle filtering out known malicious, foreign IP addresses, and other malicious traffic.

    Another route you can go is a Nginx/haproxy reverse proxy behind something like Suricata. Then you can utilize something like fail2ban or crowdsec.

    Authentik. Get everything behind a SSO experience and don’t expose your backend services to unauthenticated local traffic (utilize http basic auth with header passthrough in authentik). So many people setup auth wrong and then have something like auth.domain.com going through auth but then mistakenly have their external IP address setup to allow traffic in authenticated.