Downloads: 5 | Views: 126 | Weekly Hits: ⮙1 | Monthly Hits: ⮙4
Research Paper | Information Technology | United States of America | Volume 11 Issue 1, January 2022 | Popularity: 5.4 / 10
Threats and Mitigation Strategies in Remote Work Scenarios: A Cybersecurity Perspective Post - COVID-19
Dhaval Gogri
Abstract: The Covid - 19 pandemic brings far - reaching implications to the workplace, with adoption of remote work dramatically accelerated as well as new significant cybersecurity threats. There is a strong need to push for more stringent cybersecurity practices than ever, now that malware, ransomware, and phishing attacks are increasing cyber threats. This review paper synthesizes the emerging challenges and trends in cybersecurity prompted by the pandemic, focusing specifically on the surge of cyber threats that have exploited vulnerabilities in decentralized work structures. The paper cites evidence of the rise in cyberattacks targeting various institutions, from ransomware to phishing and Distributed Denial of Service (DDoS) incidents, and outlines the motives that fuel these increased activities. Discuss the paper as a whole. The paper reviews various tools and technologies that organizations use to combat these threats; this includes VPNs, RBI, and advanced endpoint protection solutions. Also, it highlights that there is a need for all - rounded mitigation strategies such as user education, MFA, and very robust endpoint security measures. This review establishes the analysis of nexus between Covid - 19 and cybersecurity - critical to further research continuously being done in proactively creating organizational resilience against the ever - evolving cyber threats in a post - pandemic digital environment.
Keywords: Cyber Threats, Mitigation Strategies, COVID - Pandemic, VPN, RBI, Endpoint Protection
Edition: Volume 11 Issue 1, January 2022
Pages: 1687 - 1694
DOI: https://www.doi.org/10.21275/SR220110114112
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 357 | Views: 1000 | Weekly Hits: ⮙1 | Monthly Hits: ⮙4
Information Technology, Ghana, Volume 8 Issue 6, June 2019
Pages: 64 - 69The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana
Abu Sulemana, Yahuza Abdul-Kadir
Downloads: 301 | Views: 558 | Weekly Hits: ⮙1 | Monthly Hits: ⮙4
Information Technology, India, Volume 8 Issue 1, January 2019
Pages: 456 - 460Analysis of Blockchain and its Working Principle
S. Banupriya, G. Renuka Devi
Downloads: 266 | Views: 407 | Weekly Hits: ⮙1 | Monthly Hits: ⮙4
Information Technology, China, Volume 9 Issue 1, January 2020
Pages: 107 - 112Network Optimization using Multi-Agent Genetic Algorithm
Sikandar Hanif
Downloads: 260 | Views: 471 | Weekly Hits: ⮙1 | Monthly Hits: ⮙4
Information Technology, Malaysia, Volume 8 Issue 1, January 2019
Pages: 64 - 70University of the Future (UotF): Redesign Business Model for Local University in Malaysia through Humanising Education and 4IR
Nor Zaiasron Bin Yahaya, Abdul Rahman Bin Ahmad Dahlan
Downloads: 254 | Views: 418 | Weekly Hits: ⮙1 | Monthly Hits: ⮙4
Information Technology, India, Volume 9 Issue 1, January 2020
Pages: 477 - 479IoT Based Smart Street Light for Energy Efficiency and Safety
Tanmay Patil, Arjun Ramendra