Review
Version 1
Preserved in Portico This version is not peer-reviewed
The Increase in Security Breaches through Remote Working
Version 1
: Received: 29 August 2022 / Approved: 30 August 2022 / Online: 30 August 2022 (07:58:51 CEST)
A peer-reviewed article of this Preprint also exists.
Syed AJ (2022) The Increase in Security Breaches Through Remote Working. Divers Equal Health Care. 19:35. Syed AJ (2022) The Increase in Security Breaches Through Remote Working. Divers Equal Health Care. 19:35.
Abstract
Background: The rise of cloud computing has led to the increasing number of organizations that rely on it for various tasks and services, such as education, healthcare, and e-commerce. Unfortunately, many security threats can be caused by the sudden use of cloud platforms. Objective: This paper aims to provide a comprehensive overview of these threats and how they can be mitigated. Many companies are moving toward cloud computing to sustain their business growth and provide their employees with the best possible work environment. Results: Due to the rise of cyber security threats and the unprecedented number of breaches of data, small and medium-sized enterprises are also starting to take a huge leap. The outbreak of COVID-19 has affected the lives of people all around the world. Conclusion: Due to the seriousness of the situation, the WHO has declared the COVID-19 pandemic a public health emergency. To minimize the spread of the virus, the entire world has started adopting social distancing
Keywords
Increase in Security Breaches through Remote Working; Security Breaches; Remote Working issues; Remote Working Challenges; Vulnerability issues while Remote working
Subject
Computer Science and Mathematics, Security Systems
Copyright: This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Comments (0)
We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.
Leave a public commentSend a private comment to the author(s)
* All users must log in before leaving a comment