Cybersecurity strategies in hybrid and remote work environments

Main Article Content

Boné-Andrade, Miguel Fabricio
Pinargote-Bravo, Victor Joel
Bonilla-Fierro, Luis Fernando

Abstract

The present research critically analyzes cybersecurity strategies implemented in hybrid and remote work environments, motivated by the accelerated digital transformation following the COVID-19 pandemic, which has increased attack surfaces and weakened traditional security models. Using an exploratory literature review approach, scientific articles and technical papers published between 2018 and 2024, especially those after 2020, selected from databases such as Scopus and Web of Science, were collected and classified. Among the main findings, the effectiveness of Zero Trust architecture, based on continuous verification and contextual control, and cloud security tools such as SASE, EDR and CASB, which allow flexible and scalable protection, are highlighted. In addition, decisive organizational factors such as continuous staff training and a strong security culture as well as adaptive governance frameworks aligned with international standards are identified. The research concludes that the effectiveness of cybersecurity strategies does not depend solely on technology, but on their integration with robust organizational processes, committed leadership and dynamic policies, enabling organizations to successfully meet the challenges of the decentralized digital ecosystem.

Downloads

Download data is not yet available.

Article Details

Section

Artículos

Author Biographies

Boné-Andrade, Miguel Fabricio, Pontificia Universidad Católica del Ecuador

Systems and computer engineer, Master in telecommunications systems, Master in information technologies with mention in network security and communications, Professor at the Universidad Técnica Luis Vargas Torres de Esmeraldas, Santo Domingo de los Tsáchilas.

Pinargote-Bravo, Victor Joel, Escuela Superior Politécnica Agropecuaria de Manabí Manuel Félix López

Computer Engineer with a Master's degree in Computer Science and Technology with specialization in Artificial Intelligence and Machine Learning (UPM). 14 years of experience in university teaching. Professor of Computer Science at the Escuela Superior Politécnica Agropecuaria de Manabí “MFL”, Calceta Ecuador.

Bonilla-Fierro, Luis Fernando, Universidad Estatal de Bolívar

Engineer in Electronics, Telecommunications and Networks, Escuela Superior Politécnica de Chimborazo, year 2020. Master in Information Technologies, Mention in Communications Networks, Teacher Leveling System Bolivar State University 2021, Technical Teacher, Bolivar State University January-August 2023, Analyst of Provincial Computer Technical Support of the National Transit Agency from September 2023 to present, Co-Author of the book Pedagogical Innovation in Social Sciences and Law: Strategies and Techniques of Higher Education.

How to Cite

Boné-Andrade, M. F., Pinargote-Bravo, V. J., & Bonilla-Fierro, L. F. (2023). Cybersecurity strategies in hybrid and remote work environments. Scientific Journal Science and Method, 1(4), 31-43. https://doi.org/10.55813/gaea/rcym/v1/n4/21

References

Ahmad, A., Maynard, S.B. & Park, S. Information security strategies: towards an organizational multi-strategy perspective. J Intell Manuf 25, 357–370 (2014). https://doi.org/10.1007/s10845-012-0683-0 DOI: https://doi.org/10.1007/s10845-012-0683-0

Alavi, R., Islam, S., & Ware, J. (2020). Revisiting information security training: A framework for understanding and enhancing security culture. Computers & Security, 88, 101620. DOI: https://doi.org/10.1016/j.cose.2019.101620

Celi-Párraga, R. J., Mora-Olivero, A. P., Boné-Andrade, M. F., & Sarmiento-Saavedra, J. C. (2023). Ingeniería del Software II: Implementación, Pruebas y Mantenimiento. Editorial Grupo AEA. https://doi.org/10.55813/egaea.l.2022.20 DOI: https://doi.org/10.55813/egaea.l.2022.20

ENISA. (2022). Threat Landscape 2022: Cybersecurity threats and trends. European Union Agency for Cybersecurity.

Galarza-Sánchez, P. C. (2023). Adopción de Tecnologías de la Información en las PYMEs Ecuatorianas: Factores y Desafíos. Revista Científica Zambos, 2(1), 21-40. https://doi.org/10.69484/rcz/v2/n1/36 DOI: https://doi.org/10.69484/rcz/v2/n1/36

Galarza-Sánchez, P. C., Agualongo-Yazuma, J. C., & Jumbo-Martínez, M. N. (2022). Innovación tecnológica en la industria de restaurantes del Cantón Pedro Vicente Maldonado. Journal of Economic and Social Science Research, 2(1), 31–43. https://doi.org/10.55813/gaea/jessr/v2/n1/45 DOI: https://doi.org/10.55813/gaea/jessr/v2/n1/45

Gartner. (2023). Gartner Forecasts Hybrid Work Will Be the Norm by 2025.

Gartner. (2023). Market Guide for Single-Vendor SASE. Gartner Inc. https://www.gartner.com/document/4001031

Hadlington, L. (2021). Human factors in cybersecurity: Examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours. Heliyon, 7(1), e05962.

IBM Security. (2023). Cost of a Data Breach Report 2023. IBM Corporation. https://www.ibm.com/reports/data-breach

ISACA. (2022). State of Cybersecurity 2022: Global Update on Workforce Efforts, Resources and Cyberoperations.

Kindervag, J. (2021). Zero Trust: A paradigm shift in cybersecurity. Forrester Research.

Kraemer-Mbula, E., Tijssen, R., Wallace, M. L., & McLean, R. (Eds.). (2019). Transforming Research Excellence: New Ideas from the Global South. African Minds. http://library.oapen.org/handle/20.500.12657/23441 DOI: https://doi.org/10.47622/9781928502067

Pal, A., & Pandey, R. (2021). Cloud Access Security Broker: Key Enabler for Enterprise Cloud Security. Procedia Computer Science, 192, 4482–4491.

Parsons, K., Calic, D., Pattinson, M., Butavicius, M., & McCormac, A. (2017). The human aspects of information security questionnaire (HAIS-Q): Two further validation studies. Computers & Security, 66, 40–51. https://doi.org/10.1016/j.cose.2017.01.004 DOI: https://doi.org/10.1016/j.cose.2017.01.004

PwC. (2022). 2022 Global Digital Trust Insights Survey. PricewaterhouseCoopers. https://www.pwc.com/gx/en/issues/cybersecurity/digital-trust-insights.html

Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2020). Zero Trust Architecture (NIST SP 800-207). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-207 DOI: https://doi.org/10.6028/NIST.SP.800-207-draft2

Shen, H., Liu, X., & Liu, Y. (2023). Zero Trust Architecture and Access Control Strategy in Remote Work Environments. Journal of Cyber Security Technology, 7(2), 95–112.

Tang, J., Wu, Q., & Li, Y. (2022). Cloud-Based Security Models for Remote Workforce: Evaluating the Effectiveness of SASE and EDR. Computers & Security, 118, 102739.

Verizon. (2023). Data Breach Investigations Report (DBIR) 2023. Verizon Enterprise. https://www.verizon.com/business/resources/reports/dbir/

Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers & Security, 38, 97–102. https://doi.org/10.1016/j.cose.2013.04.004 DOI: https://doi.org/10.1016/j.cose.2013.04.004