Ensuring Cyber-security in Remote Workforce: Legal Implications and International Best Practices
Abstract views: 754 / PDF downloads: 2632
DOI:
https://doi.org/10.59022/ijlp.43Keywords:
Remote Work, Cyber-security, Legal Implications, International Best Practices, Data Privacy, TelecommutingAbstract
Remote work, or telecommuting, has become increasingly popular in recent
years, with the COVID-19 pandemic accelerating its adoption. However, this shift
has also created new challenges for organizations and policymakers, particularly
with regards to cyber-security. This article explores the legal implications and
international best practices for ensuring cyber-security in remote workforces. With
remote workforces becoming more prevalent, organizations and policymakers must
consider the potential risks and implement appropriate measures to protect against
cyber threats. This includes establishing clear policies and guidelines for remote
work, providing secure remote access to company systems, and implementing
regular training and awareness programs for employees. By adopting best practices
and complying with relevant laws and regulations, organizations can help ensure
the security of their remote workforces and protect against cyber-attacks.
References
Foss, N. (2022). The rise of remote work: A trend that’s here to stay. Forbes. Retrieved from https://www.forbes.com/sites/nicolefoss/2022/01/25/the-rise-of-remote-work-a-trend-thats-here-to-stay/?sh=46b7aa533d17
Brynjolfsson, E., Horton, J. J., Ozimec, J., Rock, D., Sharma, G., & TuYe, H. Y. (2020). COVID-19 and remote work: An early look at US data. NBER. Retrieved from https://www.nber.org/papers/w27344
Sah, S. (2021). Cyber-security in remote work environment: Issues and solutions. Journal of Cyber-security, 7(1), tyab004. https://doi.org/10.1093/cybsec/tyab004
Kosakowski, J. (2021). The Future of Remote Work: A Post-Pandemic World. Forbes. https://www.forbes.com/sites/joshkosakowski/2021/06/16/the-future-of-remote-work-a-post-pandemic-world/?sh=21592cb8d047
Rajabi Asadabadi, M., & Wang, T. (2022). Cyber-security challenges and countermeasures for remote work in the post-COVID-19 era. Journal of Network and Computer Applications, 196, 107148. https://doi.org/10.1016/j.jnca.2021.107148
Kosta, E., & Baroutas, E. (2021). GDPR Compliance Challenges in the Remote Work Era. International Journal of Advanced Computer Science and Applications, 12(4), 402-406. doi: 10.14569/IJACSA.2021.0120429.
Kleinman, Z. (2022, April 12). Phishing attacks surged in 2021 as the pandemic fueled online crime. CNN Business. https://www.cnn.com/2022/04/12/tech/phishing-attacks-2021-intl-hnk/index.html
Sikorski, M., & Honig, A. (2022). Malware attacks and defenses: a comprehensive survey. ACM Computing Surveys, 55(1), 1-44. https://doi.org/10.1145/3497258
Kumar, R. (2022). Ransomware Attacks Target Small Business Owners during the Pandemic. International Journal of Cyber-security Intelligence & Cybercrime, 3(1), 17-20. https://doi.org/10.28933/ijcic-2022-03-0303
Geng, L., Li, M., & Li, L. (2022). Man-in-the-middle attack detection: a survey. Journal of Ambient Intelligence and Humanized Computing, 13(1), 179-191. doi: 10.1007/s12652-020-02726-5
Zhang, Y., & Guan, X. (2022). Detecting Denial-of-Service (DoS) Attacks with Deep Learning Techniques. IEEE Access, 10, 15311-15319. https://doi.org/10.1109/access.2022.3170213
Sharma, R. (2022). SQL Injection Attacks: Overview, Prevention, and Detection. IEEE Access, 10, 20887-20910. https://doi.org/10.1109/access.2022.3174330
Sivakumar, S. (2022). Cross-Site Scripting Attack Detection and Prevention Techniques: A Review. Journal of Computer Science and Technology, 22(1), 1-11. doi: 10.24297/jcst.v22i1.9639
Sullivan, K. (2022). The cyber threat of advanced persistent threats (APTs). Computer Fraud & Security, 2022(1), 12-16. https://doi.org/10.1016/S1361-3723(22)00009-6
Munro, R. (2022). Social Engineering Attacks: What They Are and How to Protect Yourself. Forbes. Retrieved from https://www.forbes.com/advisor/uk/banking/social-engineering-attacks/
Khandelwal, S. (2022, February 2). Google discloses zero-day vulnerability in Chrome actively exploited in the wild. The Hacker News. https://thehackernews.com/2022/02/google-discloses-zero-day-vulnerability.html
Mutchler, M. (2020). Zoom: Anatomy of a Security Failure. IEEE Security & Privacy, 18(4), 76-80. doi: 10.1109/MSEC.2020.3018558
Krebs, B. (2020, December 14). FBI, DHS, HHS Warn of Imminent, Credible Ransomware Threat against U.S. Hospitals. Krebs on Security. https://krebsonsecurity.com/2020/12/fbi-dhs-hhs-warn-of-imminent-credible-ransomware-threat-against-u-s-hospitals/
Wigmore, I. (2021, March 16). The cyber security risks of remote working. Raconteur. https://www.raconteur.net/risk-management/cyber-security-risks-remote-working/
Schmieder-Ramirez, J., & Mallette, L. A. (2021). Cyber-security and remote work environments in the era of COVID-19: Maximizing data protection under the General Data Protection Regulation (GDPR). Journal of Business Research, 131, 77-87. https://doi.org/10.1016/j.jbusres.2020.11.032
European Union Agency for Cyber-security. (2021). Legal frameworks for cyber-security in remote work. Retrieved from https://www.enisa.europa.eu/topics/remote-work/legal-frameworks-for-cybersecurity-in-remote-work
Iqbal, M. (2021). The Best Cyber Security Certifications to Consider for Your Career in 2021. Security Magazine. https://www.securitymagazine.com/articles/94998-the-best-cyber-security-certifications-to-consider-for-your-career-in-2021.
Friedman, A. (2022, February 7). Multinational compliance: How to navigate different data protection regulations. Forbes. https://www.forbes.com/sites/forbestechcouncil/2022/02/07/multinational-compliance-how-to-navigate-different-data-protection-regulations/?sh=60216f716607
General Data Protection Regulation. (2016). Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (GDPR). https://eur-lex.europa.eu/eli/reg/2016/679/oj
O'Connor, R. (2022). Best Practices for Secure Remote Work: Protecting Your Business in the Age of Remote Work. Forbes. Retrieved from https://www.forbes.com/sites/forbestechcouncil/2022/01/21/best-practices-for-secure-remote-work-protecting-your-business-in-the-age-of-remote-work/?sh=2ba21a0776e2
Rouse, M. (2022). Best Practices for Securing Remote Workers. Security Boulevard. Retrieved from https://securityboulevard.com/2022/01/best-practices-for-securing-remote-workers/
Parker, R. (2022). Secure Remote Work: Best Practices for Multi-Factor Authentication and Secure Data Storage. Security Intelligence. Retrieved from https://securityintelligence.com/posts/secure-remote-work-best-practices-multi-factor-authentication-data-storage/
Kovacs, E. (2022). Protecting Remote Workers: Best Practices for Cyber-security. Security Week. Retrieved from https://www.securityweek.com/protecting-remote-workers-best-practices-cybersecurity
International Organization for Standardization. (2013). ISO/IEC 27001:2013 - Information technology - Security techniques - Information security management systems - Requirements. Retrieved from https://www.iso.org/standard/54534.html
National Institute of Standards and Technology. (2018). Framework for improving critical infrastructure cyber-security (Version 1.1). Retrieved from https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-1.1.pdf
European Commission. (2018). General Data Protection Regulation (GDPR). Retrieved from https://ec.europa.eu/info/law/law-topic/data-protection_en
Lardinois, F. (2020). Automattic shares how it approaches remote work security. TechCrunch. Retrieved from https://techcrunch.com/2020/03/11/automattic-shares-how-it-approaches-remote-work-security/
McDermott, K. (2020). Securing a remote workforce: Best practices and benefits. TechTarget. Retrieved from https://searchsecurity.techtarget.com/feature/Securing-a-remote-workforce-Best-practices-and-benefits
Sutton, S. (2020). The potential limitations and challenges of securing remote work environments. Security Intelligence. Retrieved from https://securityintelligence.com/articles/the-potential-limitations-and-challenges-of-securing-remote-work-environments/
Dmitrienko, A., Kostiainen, K., & Asokan, N. (2018). End-to-end security for remote workers. Communications of the ACM, 61(4), 57-65. doi: 10.1145/3180494
Sharma, A., Singh, S., & Goyal, D. (2021). Emerging Trends in Cyber-security. In Cyber-security-Foundations, Paradigms and Applications (pp. 3-21). Springer. https://doi.org/10.1007/978-981-15-9866-3_1
Khan, A. I., Salah, K., Al-Muhtadi, J., & Al-Fuqaha, A. (2021). Internet of things security: Review, challenges and research directions. Journal of Network and Computer Applications, 174, 102917. doi: 10.1016/j.jnca.2020.102917
Ghosh, S., & Koo, C. (2021). A Survey of Emerging Trends in Cyber-security. IEEE Access, 9, 115262-115290. https://doi.org/10.1109/ACCESS.2021.3099251
Tunc, H., Kocyigit, A., & Aydin, M. A. (2020). Artificial intelligence in cyber security and cybercrime–a review. Journal of Cyber-security, 6(1), tyaa002. https://doi.org/10.1093/cybsec/tyaa002
Savage, N. (2017). IoT: A new frontier for security vulnerabilities. Computer, 50(2), 76-79. doi: 10.1109/MC.2017.29
Park, J. H., Lee, J. H., & Park, Y. (2020). Security challenges and countermeasures in the era of remote work. Sustainability, 12(12), 4963. https://doi.org/10.3390/su12124963
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Naeem Allah Rakha
This work is licensed under a Creative Commons Attribution 4.0 International License.