Continuing my research this week on the subject of work from home (WFH) employees and the cybersecurity challenges it uniquely poses, here are the keywords I chose to search:
Keywords
work from home cybersecurity
cybersecurity remote workers
telecommuting cybersecurity
Databases Used
Computer Source
Faulkner’s Advisory for IT Studies
Gale Onefile Computer Science Collection
SEARCH 1
Keyword: work from home cybersecurity
Database: Computer Source
# of Returned Results: 235
SEARCH 2
Keyword: telecommuting cybersecurity
Database: Computer Source
# of Returned Results: 6
SEARCH 3
Keyword: cybersecurity remote workers
Database: Computer Source
# of Returned Results: 119
SEARCH 4
Keyword: work from home cybersecurity
Database: Faulkner’s Advisory for IT Studies
# of Returned Results: 50
SEARCH 5
Keyword: telecommuting cybersecurity
Database: Faulkner’s Advisory for IT Studies
# of Returned Results: 50
SEARCH 6
Keyword: cybersecurity remote workers
Database: Faulkner’s Advisory for IT Studies
# of Returned Results: 50
SEARCH 7
Keyword: work from home cybersecurity
Database: Gale Onefile Computer Science Collection
# of Returned Results: 2230 from Academic Journals
SEARCH 8
Keyword: telecommuting cybersecurity
Database: Gale Onefile Computer Science Collection
# of Returned Results: 0 from Academic Journals
SEARCH 9
Keyword: cybersecurity remote workers
Database: Gale Onefile Computer Science Collection
# of Returned Results: 0 from Academic Journals
REFERENCES
(All of these were found using the Computer Source Database)
eWeek Editors. (2020, June 25). How to Protect Against New Surge in Attacks Targeting Remote Workers. Retrieved October 28, 2021, from https://www.eweek.com/security/how-to-protect-against-new-surge-in-attacks-targeting-remote-workers/
Martini, P. (2021, March 19). One Year Later: Overcoming the Cybersecurity Challenges of a Remote Workforce. EWeek. Retrieved October 28, 2021, from https://www.eweek.com/news/one-year-later-overcoming-the-cybersecurity-challenges-of-a-remote-workforce/
Lunetta, L. (2020, June 30). Secure Work from Home by Applying Zero-Trust Best Practices to VPN Infrastructure. Network World. Retrieved October 28, 2021, from https://www.networkworld.com/article/3563869/secure-work-from-home-by-applying-zero-trust-best-practices-to-vpn-infrastructure.html
Conger, S. (2020, October 13). The Impact of the COVID-19 Pandemic on Information Systems Management. Taylor & Francis Online. Retrieved October 28, 2021, from https://www.tandfonline.com/doi/full/10.1080/10580530.2020.1820636
HP Wolf Security. (2021, September 9). Rebellions & Rejections Report. HP Wolf Security. Retrieved from https://threatresearch.ext.hp.com/hp-wolf-security-rebellions-and-rejections-report/.
SOURCE REVIEW
Summary
Since approximate March of 2020, when numerous organizations adapted to the pandemic by instituting remote work, there has been a corresponding rise in cybersecurity risks that are specific to telecommuting. This report highlights some of the common and looming problems as well as solutions in this new remote worker cybersecurity landscape. The report discusses the pushback that remote workers have had against security policies as well as the frustration that IT departments have experienced in their attempts to institute security policies that the employees don’t fully appreciate. Finally, the report discusses the way forward toward a secure remote workforce.
Assessment
This is a useful source, and I think this stands apart from any other piece of writing on the subject. First of all, it was written by cybersecurity experts at HP’s Wolf Security group. Secondly, it was compiled from a global data survey of over 1000 IT teams which seems to constitute a decent sample size. Third, it’s a current report on a timely topic that seels to address real problems that are happening presently, worldwide, in a variety of workplace organizations.
Reflection
This first into my research topic quite nicely. My questions, specifically, are:
1. What are the most common cybersecurity risks that accompany work from home employees?
2. What measures should be taken by employers and by employees to reduce those risks?
This particular report actually provides answers to those questions, and it does so based on the respondents’ concerns and experiences.
As far as how it relates to the other literature I found, I would say it serves as validation for the other (much shorter) articles I was able to find on this subject. It also “fleshes out” some of the notions mentioned in the news and in some articles regarding the changing shape of cybersecurity due to many workers now being in their own homes (as opposed to being in the corporate office behind the company firewall).