Ensuring Cyber-security in Remote Workforce: Legal Implications and International Best Practices

Abstract views: 265 / PDF downloads: 994


  • Naeem Allah Rakha Tashkent State University of Law




Remote Work, Cyber-security, Legal Implications, International Best Practices, Data Privacy, Telecommuting


Remote work, or telecommuting, has become increasingly popular in recent
years, with the COVID-19 pandemic accelerating its adoption. However, this shift
has also created new challenges for organizations and policymakers, particularly
with regards to cyber-security. This article explores the legal implications and
international best practices for ensuring cyber-security in remote workforces. With
remote workforces becoming more prevalent, organizations and policymakers must
consider the potential risks and implement appropriate measures to protect against
cyber threats. This includes establishing clear policies and guidelines for remote
work, providing secure remote access to company systems, and implementing
regular training and awareness programs for employees. By adopting best practices
and complying with relevant laws and regulations, organizations can help ensure
the security of their remote workforces and protect against cyber-attacks.


Foss, N. (2022). The rise of remote work: A trend that’s here to stay. Forbes. Retrieved from https://www.forbes.com/sites/nicolefoss/2022/01/25/the-rise-of-remote-work-a-trend-thats-here-to-stay/?sh=46b7aa533d17

Brynjolfsson, E., Horton, J. J., Ozimec, J., Rock, D., Sharma, G., & TuYe, H. Y. (2020). COVID-19 and remote work: An early look at US data. NBER. Retrieved from https://www.nber.org/papers/w27344

Sah, S. (2021). Cyber-security in remote work environment: Issues and solutions. Journal of Cyber-security, 7(1), tyab004. https://doi.org/10.1093/cybsec/tyab004

Kosakowski, J. (2021). The Future of Remote Work: A Post-Pandemic World. Forbes. https://www.forbes.com/sites/joshkosakowski/2021/06/16/the-future-of-remote-work-a-post-pandemic-world/?sh=21592cb8d047

Rajabi Asadabadi, M., & Wang, T. (2022). Cyber-security challenges and countermeasures for remote work in the post-COVID-19 era. Journal of Network and Computer Applications, 196, 107148. https://doi.org/10.1016/j.jnca.2021.107148

Kosta, E., & Baroutas, E. (2021). GDPR Compliance Challenges in the Remote Work Era. International Journal of Advanced Computer Science and Applications, 12(4), 402-406. doi: 10.14569/IJACSA.2021.0120429.

Kleinman, Z. (2022, April 12). Phishing attacks surged in 2021 as the pandemic fueled online crime. CNN Business. https://www.cnn.com/2022/04/12/tech/phishing-attacks-2021-intl-hnk/index.html

Sikorski, M., & Honig, A. (2022). Malware attacks and defenses: a comprehensive survey. ACM Computing Surveys, 55(1), 1-44. https://doi.org/10.1145/3497258

Kumar, R. (2022). Ransomware Attacks Target Small Business Owners during the Pandemic. International Journal of Cyber-security Intelligence & Cybercrime, 3(1), 17-20. https://doi.org/10.28933/ijcic-2022-03-0303

Geng, L., Li, M., & Li, L. (2022). Man-in-the-middle attack detection: a survey. Journal of Ambient Intelligence and Humanized Computing, 13(1), 179-191. doi: 10.1007/s12652-020-02726-5

Zhang, Y., & Guan, X. (2022). Detecting Denial-of-Service (DoS) Attacks with Deep Learning Techniques. IEEE Access, 10, 15311-15319. https://doi.org/10.1109/access.2022.3170213

Sharma, R. (2022). SQL Injection Attacks: Overview, Prevention, and Detection. IEEE Access, 10, 20887-20910. https://doi.org/10.1109/access.2022.3174330

Sivakumar, S. (2022). Cross-Site Scripting Attack Detection and Prevention Techniques: A Review. Journal of Computer Science and Technology, 22(1), 1-11. doi: 10.24297/jcst.v22i1.9639

Sullivan, K. (2022). The cyber threat of advanced persistent threats (APTs). Computer Fraud & Security, 2022(1), 12-16. https://doi.org/10.1016/S1361-3723(22)00009-6

Munro, R. (2022). Social Engineering Attacks: What They Are and How to Protect Yourself. Forbes. Retrieved from https://www.forbes.com/advisor/uk/banking/social-engineering-attacks/

Khandelwal, S. (2022, February 2). Google discloses zero-day vulnerability in Chrome actively exploited in the wild. The Hacker News. https://thehackernews.com/2022/02/google-discloses-zero-day-vulnerability.html

Mutchler, M. (2020). Zoom: Anatomy of a Security Failure. IEEE Security & Privacy, 18(4), 76-80. doi: 10.1109/MSEC.2020.3018558

Krebs, B. (2020, December 14). FBI, DHS, HHS Warn of Imminent, Credible Ransomware Threat against U.S. Hospitals. Krebs on Security. https://krebsonsecurity.com/2020/12/fbi-dhs-hhs-warn-of-imminent-credible-ransomware-threat-against-u-s-hospitals/

Wigmore, I. (2021, March 16). The cyber security risks of remote working. Raconteur. https://www.raconteur.net/risk-management/cyber-security-risks-remote-working/

Schmieder-Ramirez, J., & Mallette, L. A. (2021). Cyber-security and remote work environments in the era of COVID-19: Maximizing data protection under the General Data Protection Regulation (GDPR). Journal of Business Research, 131, 77-87. https://doi.org/10.1016/j.jbusres.2020.11.032

European Union Agency for Cyber-security. (2021). Legal frameworks for cyber-security in remote work. Retrieved from https://www.enisa.europa.eu/topics/remote-work/legal-frameworks-for-cybersecurity-in-remote-work

Iqbal, M. (2021). The Best Cyber Security Certifications to Consider for Your Career in 2021. Security Magazine. https://www.securitymagazine.com/articles/94998-the-best-cyber-security-certifications-to-consider-for-your-career-in-2021.

Friedman, A. (2022, February 7). Multinational compliance: How to navigate different data protection regulations. Forbes. https://www.forbes.com/sites/forbestechcouncil/2022/02/07/multinational-compliance-how-to-navigate-different-data-protection-regulations/?sh=60216f716607

General Data Protection Regulation. (2016). Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (GDPR). https://eur-lex.europa.eu/eli/reg/2016/679/oj

O'Connor, R. (2022). Best Practices for Secure Remote Work: Protecting Your Business in the Age of Remote Work. Forbes. Retrieved from https://www.forbes.com/sites/forbestechcouncil/2022/01/21/best-practices-for-secure-remote-work-protecting-your-business-in-the-age-of-remote-work/?sh=2ba21a0776e2

Rouse, M. (2022). Best Practices for Securing Remote Workers. Security Boulevard. Retrieved from https://securityboulevard.com/2022/01/best-practices-for-securing-remote-workers/

Parker, R. (2022). Secure Remote Work: Best Practices for Multi-Factor Authentication and Secure Data Storage. Security Intelligence. Retrieved from https://securityintelligence.com/posts/secure-remote-work-best-practices-multi-factor-authentication-data-storage/

Kovacs, E. (2022). Protecting Remote Workers: Best Practices for Cyber-security. Security Week. Retrieved from https://www.securityweek.com/protecting-remote-workers-best-practices-cybersecurity

International Organization for Standardization. (2013). ISO/IEC 27001:2013 - Information technology - Security techniques - Information security management systems - Requirements. Retrieved from https://www.iso.org/standard/54534.html

National Institute of Standards and Technology. (2018). Framework for improving critical infrastructure cyber-security (Version 1.1). Retrieved from https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-1.1.pdf

European Commission. (2018). General Data Protection Regulation (GDPR). Retrieved from https://ec.europa.eu/info/law/law-topic/data-protection_en

Lardinois, F. (2020). Automattic shares how it approaches remote work security. TechCrunch. Retrieved from https://techcrunch.com/2020/03/11/automattic-shares-how-it-approaches-remote-work-security/

McDermott, K. (2020). Securing a remote workforce: Best practices and benefits. TechTarget. Retrieved from https://searchsecurity.techtarget.com/feature/Securing-a-remote-workforce-Best-practices-and-benefits

Sutton, S. (2020). The potential limitations and challenges of securing remote work environments. Security Intelligence. Retrieved from https://securityintelligence.com/articles/the-potential-limitations-and-challenges-of-securing-remote-work-environments/

Dmitrienko, A., Kostiainen, K., & Asokan, N. (2018). End-to-end security for remote workers. Communications of the ACM, 61(4), 57-65. doi: 10.1145/3180494

Sharma, A., Singh, S., & Goyal, D. (2021). Emerging Trends in Cyber-security. In Cyber-security-Foundations, Paradigms and Applications (pp. 3-21). Springer. https://doi.org/10.1007/978-981-15-9866-3_1

Khan, A. I., Salah, K., Al-Muhtadi, J., & Al-Fuqaha, A. (2021). Internet of things security: Review, challenges and research directions. Journal of Network and Computer Applications, 174, 102917. doi: 10.1016/j.jnca.2020.102917

Ghosh, S., & Koo, C. (2021). A Survey of Emerging Trends in Cyber-security. IEEE Access, 9, 115262-115290. https://doi.org/10.1109/ACCESS.2021.3099251

Tunc, H., Kocyigit, A., & Aydin, M. A. (2020). Artificial intelligence in cyber security and cybercrime–a review. Journal of Cyber-security, 6(1), tyaa002. https://doi.org/10.1093/cybsec/tyaa002

Savage, N. (2017). IoT: A new frontier for security vulnerabilities. Computer, 50(2), 76-79. doi: 10.1109/MC.2017.29

Park, J. H., Lee, J. H., & Park, Y. (2020). Security challenges and countermeasures in the era of remote work. Sustainability, 12(12), 4963. https://doi.org/10.3390/su12124963



How to Cite

Allah Rakha, N. (2023). Ensuring Cyber-security in Remote Workforce: Legal Implications and International Best Practices. International Journal of Law and Policy, 1(3). https://doi.org/10.59022/ijlp.43