Preprint Review Version 1 Preserved in Portico This version is not peer-reviewed

The Increase in Security Breaches through Remote Working

Version 1 : Received: 29 August 2022 / Approved: 30 August 2022 / Online: 30 August 2022 (07:58:51 CEST)

A peer-reviewed article of this Preprint also exists.

Syed AJ (2022) The Increase in Security Breaches Through Remote Working. Divers Equal Health Care. 19:35. Syed AJ (2022) The Increase in Security Breaches Through Remote Working. Divers Equal Health Care. 19:35.

Abstract

Background: The rise of cloud computing has led to the increasing number of organizations that rely on it for various tasks and services, such as education, healthcare, and e-commerce. Unfortunately, many security threats can be caused by the sudden use of cloud platforms. Objective: This paper aims to provide a comprehensive overview of these threats and how they can be mitigated. Many companies are moving toward cloud computing to sustain their business growth and provide their employees with the best possible work environment. Results: Due to the rise of cyber security threats and the unprecedented number of breaches of data, small and medium-sized enterprises are also starting to take a huge leap. The outbreak of COVID-19 has affected the lives of people all around the world. Conclusion: Due to the seriousness of the situation, the WHO has declared the COVID-19 pandemic a public health emergency. To minimize the spread of the virus, the entire world has started adopting social distancing

Keywords

Increase in Security Breaches through Remote Working; Security Breaches; Remote Working issues; Remote Working Challenges; Vulnerability issues while Remote working

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.