Adapting to Remote Work: Emerging Cyber Risks and How to Safeguard Your Organization

Main Article Content

Jyotirmay Jena

Abstract

The COVID-19 pandemic has rapidly accelerated the shift to remote work, permanently altering organizational dynamics. As businesses and employees adapted to a remote-first environment, they also became exposed to a new set of cybersecurity threats. The traditional cybersecurity measures designed for office environments are no longer sufficient to address the unique risks associated with remote work. These risks include vulnerabilities in home networks, unsecured devices, increased susceptibility to phishing and social engineering attacks, and the rapid adoption of cloud-based collaboration tools. This paper will explore the cybersecurity challenges posed by remote work and suggest proactive steps organizations can take to safeguard their data, assets, and personnel. Key strategies, including enhanced endpoint security, secure communication channels, Multi-Factor Authentication (MFA), security awareness training, and Zero Trust architecture, will be discussed to help organizations minimize their exposure to these emerging risks.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Article Details

How to Cite
Jena, J. (2025). Adapting to Remote Work: Emerging Cyber Risks and How to Safeguard Your Organization. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 11(1), 1763–1773. https://doi.org/10.61841/turcomat.v11i1.15190
Section
Research Articles

References

Anderson, R. (2008). Security engineering: A guide to building dependable distributed systems (2nd ed.). Wiley.

Bayuk, J. L., Healey, M., & McCracken, L. (2012). Cybersecurity policy guidebook. Wiley.

Brown, I., & Rainer, R. K. (2014). The evolving threat landscape and the challenges to cybersecurity. International Journal of Computer Science and Network Security, 14(1), 10-21.

Chellappa, R. K., & Sinanoglu, O. (2012). Data privacy and security in the cloud: Challenges and opportunities. Journal of Information Privacy and Security, 8(4), 12-25.

Cluley, G. (2015). How remote working exposes organizations to cyber risk. Computer Fraud & Security, 2015(9), 10-15.

Ekelhart, A., Weippl, E., & Neumayr, A. (2013). Security risk management frameworks for cloud computing. International Journal of Cloud Computing and Services Science, 2(4), 102-112.

Fang, Y., & Wang, X. (2011). Enterprise information security management in cloud computing environment. Journal of Cloud Computing: Advances, Systems and Applications, 2(4), 31-36.

Garfinkel, S. L. (2007). Database security: Challenges and opportunities. Springer.

Gibson, S. (2014). An analysis of vulnerabilities in the cloud computing security model. Journal of Information Security, 5(1), 1-9.

Gupta, A., & Kohli, A. (2014). The convergence of cloud computing and cyber security. Journal of Information Systems, 28(3), 24-34.

Han, K., & Liu, S. (2016). Security and privacy in cloud computing: A survey. International Journal of Computer Applications, 139(10), 16-22.

Herley, C. (2009). So long, and no thanks for the externalities: The rational rejection of security advice by users. In Proceedings of the 2009 New Security Paradigms Workshop (pp. 133-144). ACM.

Hossain, M. S., & Kaur, K. (2017). Cloud computing security and privacy: A comprehensive survey. International Journal of Cloud Computing and Services Science, 6(5), 51-66.

Kuo, H. C., & Lu, Y. L. (2011). Enhancing cloud computing security with intrusion detection and prevention. International Journal of Cloud Computing and Services Science, 2(3), 72-81.

Langford, G. (2017). Security risks of remote work in small businesses. Cybersecurity Review, 8(3), 29-35.

Miller, B. (2010). Cloud computing security issues and challenges: A survey. International Journal of Computer Applications, 1(1), 43-48.

Mitnick, K. D., & Simon, W. L. (2002). The art of deception: Controlling the human element of security. Wiley.

Moyer, T., & Watson, C. (2015). Adapting security infrastructure to meet the challenges of remote work environments. Journal of Information Systems and Technology Management, 12(2), 125-133.

National Institute of Standards and Technology (NIST). (2016). Cybersecurity framework. NIST Special Publication 800-53. Retrieved from https://www.nist.gov/cyberframework

Pash, A., & O’Neill, M. (2016). Cybersecurity vulnerabilities in remote working environments: A case study. Journal of Computer Security, 14(4), 212-223.

Pinto, S. R., & Krishna, M. (2014). A systematic study of risks and security threats in cloud computing. Journal of Cloud Computing: Advances, Systems and Applications, 3(1), 10-15.

Rozen, E., & Sharma, S. (2018). Mobile devices and cybersecurity in remote work settings. Journal of Cybersecurity Education, Research and Practice, 3(2), 44-59.

Sahay, B. S., & Kaur, P. (2013). Security in cloud computing: A comprehensive review. Journal of Cloud Computing: Advances, Systems and Applications, 3(1), 5-14.

Spafford, E. H., & Gennaro, R. (2008). Virtualization and security in distributed systems. ACM Computing Surveys, 25(4), 1-23.

Willison, R., & Warkentin, M. (2013). Beyond the hacker: An exploration of insider threats to organizational information systems. International Journal of Information Management, 33(6), 920-929.