Abstract
Cyber security threats, including risks to remote workers, are varied and diverse, with the number of scams and business email compromise breaches increasing. Firms and their staff are experiencing mass phishing attacks, several typical precursors to more sinister attacks like cyber-enabled fraud, ransomware, and denial of service (DDoS) attacks. Threat actors are leveraging new technologies such as machine learning and artificial intelligence (AI) to deliver sophisticated scam and phishing messages that are challenging for users to identify as malicious. Several businesses are increasing technical efforts in critical areas, including network hardening, robust patching, anti-malware, ransomware detection applications, and multi-factor authentication to detect, prevent, and recover from potential threats. Despite that, these measures provide only a partial solution if the users who access the systems do not have good security awareness training. In this study, we review some cyber risks related to remote working and detail how they can be remediated through regular security awareness education campaigns (SAECs). The study presents the results of a proof of concept (PoC) experiment conducted to establish the value of regular SAECs in the fight against scams and phishing attacks against remote workers. The pilot results confirm that securing the remote office requires a robust SAEC. It argues that to be successful and help staff protect business systems and data, SAECs must be regular and varied, providing opportunities for staff to understand what to look for in suspicious scams and phishing emails. Moreover, they must provide opportunities for staff to practice their knowledge and understanding through practical exercises such as spam and phishing simulation exercises, which could help users avoid falling victim to spam and phishing emails.
Similar content being viewed by others
Availability of data and materials
The results data/figure in this manuscript have not been published elsewhere, nor are they under consideration by another publisher. The data that support the findings of this study are available on request from the corresponding author.
References
Georgiadou, A., Mouzakitis, S., Askounis, D.: Working from home during COVID-19 crisis: a cyber security culture assessment survey. Secur. J. 35(2), 486–505 (2022)
Tasheva, I.: Cybersecurity post-COVID-19: lessons learned and policy recommendations. Eur. View 20(2), 140–149 (2021)
Pranggono, B., Arabo, A.: COVID-19 pandemic cybersecurity issues. Internet Technol. Lett. 4(2), e247 (2021)
Hijji, M., Alam, G.: Cybersecurity awareness and training (CAT) framework for remote working employees. Sensors 22(22), 8663 (2022)
Tzokatziou, G., Maglaras, L., Janicke, H.: Insecure by design: Using human interface devices to exploit SCADA systems. In: 3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015) 3, pp. 103–106 (2015)
Sebastian, G.: A descriptive study on cybersecurity challenges of working from home during COVID-19 pandemic and a proposed 8 step WFH cyber-attack mitigation plan. Commun. IBIMA 2, 2–7 (2021)
Lambat, Y., Ayres, N., Maglaras, L., Ferrag, M.A.: A mamdani type fuzzy inference system to calculate employee susceptibility to phishing attacks. Appl. Sci. 11(19), 9083 (2021)
Kagerl, C., Starzetz, J.: Working from home for good? lessons learned from the COVID-19 pandemic and what this means for the future of work. J. Bus. Econ. 93(1), 229–265 (2023)
Yang, L., Holtz, D., Jaffe, S., Suri, S., Sinha, S., Weston, J., Joyce, C., Shah, N., Sherman, K., Hecht, B., et al.: The effects of remote work on collaboration among information workers. Nat. Hum. Behav. 6(1), 43–54 (2022)
Lidong Wang and Cheryl Ann Alexander: Cyber security during the COVID-19 pandemic. AIMS Electron. Electr. Eng. 5(2), 146–157 (2021)
Barrero, J.M., Bloom, N., Davis, S.J.: 60 million fewer commuting hours per day: how Americans use time saved by working from home. University of Chicago, Becker Friedman Institute for Economics Working Paper (2020-132) (2020)
Angafor, G.N., Yevseyeva, I., Maglaras, L.: Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise. Inf. Comput. Secur. (2023)
Bada, M., Sasse, A.M., Nurse, J.R.C.: Cyber security awareness campaigns: Why do they fail to change behaviour? arXiv preprint arXiv:1901.02672 (2019)
Abawajy, J.: User preference of cyber security awareness delivery methods. Behav. Inf. Technol. 33(3), 237–248 (2014)
CybSafe. 7 reasons why security awareness training is important in 2023, Mar 2023. https://www.cybsafe.com/blog/7-reasons-why-security-awareness-training-is-important/
Pattinson, M., Butavicius, M., Lillie, M., Ciccarello, B., Parsons, K., Calic, D., McCormac, A.: Matching training to individual learning styles improves information security awareness. Inf. Comput. Secur. 28(1), 1–14 (2020)
Kovačević, A., Radenković, S.D.: SAWIT—security awareness improvement tool in the workplace. Appl. Sci. 10(9), 3065 (2020)
Kovačević, A., Putnik, N., Tošković, O.: Factors related to cyber security behavior. IEEE Access 8, 125140–125148 (2020)
Aldawood, H., Skinner, G.: Reviewing cyber security social engineering training and awareness programs-pitfalls and ongoing issues. Future Internet 11(3), 73 (2019)
Tasevski, P.: It and cyber security awareness-raising campaigns. Inf. Secur. 34(1), 7–22 (2016)
Middaugh, D.J.: Cybersecurity attacks during a pandemic: it is not just it’s job! Medsurg Nurs. 30(1), 65–66 (2021)
Mohammed ALotibi and Abdulrahman Abdullah Alghamdi: The effect of applying information security awareness concept of MOH employees on cybersecurity department-ministry of health-Riyadh. J. Inf. Secur. Cybercrimes Res. 5(2), 144–163 (2022)
Furnell, S., Network Research Group, et al.: Securing the home worker. Netw. Secur. 2006(11), 6–12 (2006)
Steven Furnell and Jayesh Navin Shah: Home working and cyber security-an outbreak of unpreparedness? Comput. Fraud Secur. 2020(8), 6–12 (2020)
Siadati, H., Palka, S., Siegel, A., McCoy, D.: Measuring the effectiveness of embedded phishing exercises. In: 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17) (2017)
Student guide to phishing: what to do if you click (but don’t click!), Aug 2021. URL https://www.onlineeducation.com/features/student-guide-to-phishing-attacks
Alkhalil, Z., Hewage, C., Nawaf, L., Khan, I.: Phishing attacks: a recent comprehensive study and a new anatomy. Front. Comput. Sci. 3, 563060 (2021)
Al-Qahtani, A.F., Cresci, S.: The COVID-19 scamdemic: a survey of phishing attacks and their countermeasures during COVID-19. IET Inf. Secur. 16(5), 324–345 (2022)
Mahadevan, P.: Cybercrime. Threats during the COVID (2019)
Alsharnouby, M., Alaca, F., Chiasson, S.: Why phishing still works: user strategies for combating phishing attacks. Int. J. Hum. Comput. Stud. 82, 69–82 (2015)
Miranda, M.J.A.: Enhancing cybersecurity awareness training: a comprehensive phishing exercise approach. Int. Manag. Rev. 14(2), 5–10 (2018)
Sharma, P., Dash, B., Ansari, M.F.: Anti-phishing techniques-a review of cyber defense mechanisms. IJARCCE 11(7), 153–160 (2022)
Ahmad, T.: Pandemic and work from home: challenges of cybercrimes and cybersecurity. Available at SSRN (2020)
URL https://www.pwc.nl/nl/themas/assets/pdf/impact-of-covid-19-on-cyber-security-nl.pdf
Reegård, K., Blackett. C., Katta. V.: The Concept of Cybersecurity Culture (2019). https://doi.org/10.3850/978-981-11-2724-3_0761-cd
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare no competing interests.
Ethical approval
The authors declare full compliance with ethical standards. This article does not contain any studies involving humans or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix A: Questionnaire
Appendix A: Questionnaire
Security Awareness Education Campaigns
PoC Initial Survey
-
1.
Which business sector are you in?
-
(a)
Customer Services
-
(b)
Information Technology
-
(c)
Government including local councils
-
(d)
Financial Industry
-
(e)
Health and care sector
-
(f)
Commercial sector
-
(a)
-
2.
What department do you work in?
-
(a)
Human Resources
-
(b)
Service Desk
-
(c)
IT
-
(d)
Finance
-
(e)
Learning and Development
-
(f)
Project Management
-
(a)
-
3.
What is your highest qualification?
-
(a)
GCSE
-
(b)
Advanced Level
-
(c)
Diploma
-
(d)
Degree
-
(e)
Masters or MBA
-
(f)
PhD
-
(g)
other
-
(a)
-
4.
Do you know what phishing is?
-
5.
Do you know what spam is?
-
6.
Do you know what social engineering is?
-
7.
Which one of the following best describes your working status?
-
(a)
Office Based
-
(b)
Hybrid
-
(c)
Remote
-
(a)
-
8.
If your work is remote, when did you start?
-
(a)
Before COVID’19
-
(b)
During COVID’19
-
(c)
After COVID’19
-
(a)
-
9.
Have you been exposed to scams or phishing email threats while working remotely?
-
(a)
Scam emails
-
(b)
Phishing emails
-
(c)
All of the above
-
(a)
-
10.
Select the most relevant statement from the list below
-
(a)
I can confidently identify scam and phishing emails
-
(b)
I may be able to recognize scam and phishing emails
-
(c)
i am not able to recognize scam and phishing emails
-
(a)
-
11.
Select all the options that apply to you.
-
(a)
I understand what cyber security awareness education campaigns are
-
(b)
My company carries out regular cyber security awareness education campaigns
-
(c)
I have recently attended a cyber security awareness education campaign
-
(a)
-
12.
I believe that regular security awareness campaigns encourage users to be conscious of cyber security threats.
-
(a)
Yes
-
(b)
No
-
(c)
Don’t Know
-
(a)
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Angafor, G.N., Yevseyeva, I. & Maglaras, L. Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns. Int. J. Inf. Secur. 23, 1679–1693 (2024). https://doi.org/10.1007/s10207-023-00809-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-023-00809-5