Cybersecurity Strategies in Incident Reduction in Remote Work Environments: A Systematic Review

Authors

Keywords:

Cybersecurity, Remote work, Multi-factor authentication, Cybersecurity training, Artificial intelligence

Abstract

INTRODUCTION: The rise of remote work has increased organizational exposure to cybersecurity risks, highlighting the need for effective strategies to mitigate incidents. This study examines the impact of various cybersecurity measures on risk reduction in this context. METHOD: A systematic review of the literature was conducted using the PRISMA methodology. Nineteen relevant studies were selected and analyzed from reputable databases, focusing on multi-factor authentication, training, AI-based monitoring tools, and sectoral differences in security measures implementation. RESULTS: Findings reveal that multi-factor authentication reduces unauthorized access by up to 95% in highly tech-enabled sectors, while AI-based tools achieve early threat detection rates exceeding 90%. Continuous cybersecurity training reduces human errors by up to 50%, fostering a more secure organizational culture. However, resource-constrained sectors, such as education, face significant barriers to implementing these solutions. DISCUSSION: This analysis underscores the importance of combining advanced technologies with continuous training programs and inclusive policies to bridge sectoral gaps. Additionally, it highlights the need to develop accessible technologies and robust regulatory frameworks to ensure effective responses to future threats.

References

Application of artificial intelligence in computer network security,. (s/f). https://doi.org/10.1088/1742-6596/1865/4/042039.

Avarias, J., Leon, F., Carrasco, R., Lobos, J., Ibsen, J., Achermann, C., Parra, J., & Soto, R. (2024). Adding cybersecurity in JAO organizational culture: do’s and dont’s. En L. J. Storrie-Lombardi, C. R. Benn, & A. Chrysostomou (Eds.), Observatory Operations: Strategies, Processes, and Systems X (p. 12). SPIE.

Bispham, M., Creese, S., Dutton, W. H., Esteve-González, P., & Goldsmith, M. (2022). An exploratory study of cybersecurity in working from home: Problem or enabler? Journal of Information Policy, 12, 353–386. https://doi.org/10.5325/jinfopoli.12.2022.0010

Čergeť, M., & Hudec, J. (2023). Cyber-Security Threats Origins and their Analysis. Acta polytechnica Hungarica, 20(9), 23–41. https://doi.org/10.12700/aph.20.9.2023.9.2

Feng, X., Feng, Y., & Dawam, E. S. (2020). Artificial intelligence cyber security strategy. 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech).

Flores, C., Gonzalez, J., Kajtazi, M., Bugeja, J., & Vogel, B. (2023). Human factors for cybersecurity awareness in a remote work environment. Proceedings of the 9th International Conference on Information Systems Security and Privacy, 608–616.

Glorin, S. (2021). A descriptive study on cybersecurity challenges of working from home during COVID-19 pandemic and a proposed 8 step WFH cyber-attack mitigation plan. Communications of the IBIMA, 1–7. https://doi.org/10.5171/2021.589235

Jakimoski, K. (2023). Automation Improvement in Cyber Risk Management. 2023 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), 1–6.

Kanter-Ramirez, C. A., Lopez-Leyva, J. A., Beltran-Rocha, L., & Ferková, D. (2020). Framework for the optimal design of an information system to diagnostic the enterprise security level and management the information risk based on ISO/IEC-27001. En Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (pp. 3–13). Springer International Publishing.

Klein, G., & Zwilling, M. (2024). The weakest link: Employee cyber-defense behaviors while working from home. Journal of Computer Information Systems, 64(3), 408–422. https://doi.org/10.1080/08874417.2023.2221200

Leroy, I., & Zolotaryova, I. (2023). Insights for economic security: Recovery strategies from cyber-attacks. 2023 13th International Conference on Dependable Systems, Services and Technologies (DESSERT), 1–7.

Mandal, S., Khan, D. A., & Jain, S. (2021). Cloud-based zero trust access control policy: An approach to support work-from-home driven by COVID-19 pandemic. New Generation Computing, 39(3–4), 599–622. https://doi.org/10.1007/s00354-021-00130-6

Nyarko, D. A., & Fong, R. C.-W. (2023). Cyber security compliance among remote workers. En Advanced Sciences and Technologies for Security Applications (pp. 343–369). Springer International Publishing.

Pranggono, B., & Arabo, A. (2021). COVID‐19 pandemic cybersecurity issues. Internet Technology Letters, 4(2). https://doi.org/10.1002/itl2.247

Sstla, V., Kolli, V., & Voggu, L. (2020). Predictive model for network intrusion detection system using deep learning. Revue d intelligence artificielle, 34(3), 323–330. https://doi.org/10.18280/ria.340310

Sun, N., Zhang, J., Gao, S., Zhang, L. Y., Camtepe, S., & Xiang, Y. (2020). Data analytics of crowdsourced resources for cybersecurity intelligence. En Lecture Notes in Computer Science (pp. 3–21). Springer International Publishing.

Whitty, M. T., Moustafa, N., & Grobler, M. (2024). Cybersecurity when working from home during COVID-19: considering the human factors. Journal of Cybersecurity, 10(1). https://doi.org/10.1093/cybsec/tyae001

Working from home: Cybersecurity in the age of covid-19. (2020). Issues In Information Systems. https://doi.org/10.48009/4_iis_2020_234-246

Wright, T., Ruhwanya, Z., & Ophoff, J. (2024). Using the theory of interpersonal behaviour to explain employees’ cybercrime preventative behaviour during the pandemic. Information and Computer Security, 32(4), 436–458. https://doi.org/10.1108/ics-11-2023-0228

Published

2025-06-30

Issue

Section

Review articles