Securing the Distributed Workforce: A Framework for Enterprise Cybersecurity in the Post-COVID Era
DOI:
https://doi.org/10.63282/3050-922X.ICRCEDA25-127Keywords:
Distributed workforce, Cybersecurity, Post-COVID, Zero Trust, Remote Work, Identity-Centric Security, Threat IntelligenceAbstract
COVID-19 is the new standard for forced changes in the workforce, forcing the adoption of remote and hybrid work environments globally. It was in the period of this rapid adoption of distributed work environments that new opportunities for flexibility and productivity were opened up, but fundamental weaknesses of conventional notions of cybersecurity were unveiled. As employees connect to company networks from a plethora of different places and different types of devices, situations were complex at the corporate level to ensure that security measures remained adequately stringent. New threats came to the fore, such as endpoint devices that have added more risks since they were unsecured home networks and the use of personal devices (BYOD). All these changes raised the concern of a new security model for the enterprise whereby new, fresh methods of dealing with the issue emphasize strategies which accommodate the change, and we affirm the need to put in place security architecture that will help protect the valuable enterprise assets. This paper looks at the new challenges of defending the widely dispersed employee base and offers an integrated solution for protecting the modern enterprise. To address risks inherent in the current working environments, the framework seeks to address concerns of identity-centric security and zero-trust and apply emerging technologies in threat intelligence. Using knowledge acquired by current cyber assaults and actual programs, the research provides numerous substantial approaches to countering current and potential cyber threats. The research also identifies the main recommendations for enterprises operating in this environment, including the need for active management of risks and constant adaptation to threats
References
[1] Gogri, D. Threats and Mitigation Strategies in Remote Work Scenarios: A Cybersecurity Perspective Post-COVID-19. Risk management, 4, 5.
[2] Borkovich, D. J., & Skovira, R. J. (2020). Working from home: Cybersecurity in the age of COVID-19. Issues in Information Systems, 21(4).
[3] Bispham, M., Creese, S., Dutton, W. H., Esteve-Gonzalez, P., & Goldsmith, M. (2021, August). Cybersecurity in working from home: An exploratory study. In TPRC49: The 49th Research Conference on Communication, Information and Internet Policy.
[4] Atstāja, L., Rūtītis, D., Deruma, S., & Aksjoņenko, E. (2021). Cyber security risks and challenges in remote work under the COVID-19 pandemic. European Proceedings of Social and Behavioural Sciences.
[5] Ibrar, M., Yin, S., Li, H., Karim, S., & Laghari, A. A. (2024). Comprehensive review of emerging cybersecurity trends and developments. International Journal of Electronic Security and Digital Forensics, 16(5), 633-647.
[6] Choudhary, A., Choudhary, G., Pareek, K., Kunndra, C., Luthra, J., & Dragoni, N. (2022). Emerging cyber security challenges after COVID pandemic: a survey. Journal of Internet Services and Information Security, 12(2), 21-50.
[7] Syed, N. F., Shah, S. W., Shaghaghi, A., Anwar, A., Baig, Z., & Doss, R. (2022). Zero trust architecture (ZTA): A comprehensive survey. IEEE Access, 10, 57143-57179.
[8] Stafford, V. (2020). Zero trust architecture. NIST special publication, 800, 207.
[9] Barthe-Dejean, G. (2021). Shifting paradigms: Regionalisation and the post-COVID-19 risk matrix. Journal of Risk Management in Financial Institutions, 14(4), 355-366.
[10] Malatji, M., Von Solms, S., & Marnewick, A. (2019). Socio-technical systems cybersecurity framework. Information & Computer Security, 27(2), 233-272.
[11] Sharma, H. (2022). Zero Trust in the Cloud: Implementing Zero Trust Architecture for Enhanced Cloud Security. ESP Journal of Engineering & Technology Advancements (ESP-JETA), 2(2), 78-91.
[12] Hijji, M., & Alam, G. (2022). Cybersecurity Awareness and Training (CAT) framework for remote working employees. Sensors, 22(22), 8663.
[13] Buckley, B., & Dion, M. (2021). Securing a Remote Workforce. CPM-Capstone, University of New Hampshire.
[14] Aigner, A., & Khelil, A. (2020, June). A benchmark of security metrics in cyber-physical systems. In 2020 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops) (pp. 1-6). IEEE.
[15] Safitra, M. F., Lubis, M., & Fakhrurroja, H. Counterattacking cyber threats: A framework for the future of cybersecurity. Sustainability, 15(18), 13369.
[16] Al-Hawawreh, M., Moustafa, N., Garg, S., & Hossain, M. S. (2020). Deep learning-enabled threat intelligence scheme in the Internet of Things networks. IEEE Transactions on Network Science and Engineering, 8(4), 2968-2981.
[17] Tasheva, I. (2021). Cybersecurity post-COVID-19: Lessons learned and policy recommendations. European View, 20(2), 140-149.
[18] Sharma, D. H., Dhote, C. A., & Potey, M. M. (2016). Identity and access management as security-as-a-service from clouds. Procedia Computer Science, 79, 170-174.
[19] Li, Z., Wang, D., Abbas, J., & Mubeen, R. (2022). Tourists’ health risk threats amid COVID-19 era: role of technology innovation, Transformation, and recovery implications for sustainable tourism. Frontiers in Psychology, 12, 769175.
[20] Chakraborty, T., & Ghosh, I. (2020). Real-time forecasts and risk assessment of novel coronavirus (COVID-19) cases: A data-driven analysis. Chaos, Solitons & Fractals, 135, 109850.
[21] Sree Lakshmi Vineetha Bitragunta, 2022. "Field-Test Analysis and Comparative Evaluation of LTE and PLC Communication Technologies in the Context of Smart Grid", ESP Journal of Engineering & Technology Advancements 2(3): 154-161.
[22] Puvvada, R. K. "Optimizing Financial Data Integrity with SAP BTP: The Future of Cloud-Based Financial Solutions." European Journal of Computer Science and Information Technology 13.31 (2025): 101-123.
[23] Mohanarajesh Kommineni. (2023/6). Investigate Computational Intelligence Models Inspired By Natural Intelligence, Such As Evolutionary Algorithms And Artificial Neural Networks. Transactions On Latest Trends In Artificial Intelligence. 4. P30. Ijsdcs.
[24] Praveen Kumar Maroju, "Assessing the Impact of AI and Virtual Reality on Strengthening Cybersecurity Resilience Through Data Techniques," Conference: 3rd International conference on Research in Multidisciplinary Studies Volume: 10, 2024. - 1
[25] Ashima Bhatnagar Bhatia Padmaja Pulivarthi, (2024). Designing Empathetic Interfaces Enhancing User Experience Through Emotion. Humanizing Technology With Emotional Intelligence. 47-64. IGI Global.
[26] Attaluri, V., & Aragani, V. M. (2025). “Sustainable Business Models: Role-Based Access Control (RBAC) Enhancing Security and User Management”. In Driving Business Success Through Eco-Friendly Strategies (pp. 341- 356). IGI Global Scientific Publishing.
[27] Animesh Kumar, “Redefining Finance: The Influence of Artificial Intelligence (AI) and Machine Learning (ML)”, Transactions on Engineering and Computing Sciences, 12(4), 59-69. 2024.
[28] Kirti Vasdev. (2020). “GIS in Cybersecurity: Mapping Threats and Vulnerabilities with Geospatial Analytics”. International Journal of Core Engineering & Management, 6(8, 2020), 190–195. https://doi.org/10.5281/zenodo.15193953
[29] Kirti Vasdev. (2025). “Churn Prediction in Telecommunications Using Geospatial and Machine Learning Techniques”. International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences, 13(1), 1–7. https://doi.org/10.5281/zenodo.14607920
[30] Puneet Aggarwal,Amit Aggarwal. "Empowering Intelligent Enterprises: Leveraging SAP's SIEM Intelligence for Proactive Cybersecurity", International Journal of Computer Trends and Technology, 72 (10), 15-21, 2024.
[31] Sahil Bucha, “Integrating Cloud-Based E-Commerce Logistics Platforms While Ensuring Data Privacy: A Technical Review,” Journal Of Critical Reviews, Vol 09, Issue 05 2022, Pages1256-1263.
[32] Srinivas Chippagiri, Savan Kumar, Sumit Kumar,” Scalable Task Scheduling in Cloud Computing Environments Using Swarm Intelligence-Based Optimization Algorithms”, Journal of Artificial Intelligence and Big Data (jaibd), 1(1),1-10,2016.
[33] Khan, S., Noor, S., Javed, T. et al. “XGBoost-enhanced ensemble model using discriminative hybrid features for the prediction of sumoylation sites”. BioData Mining 18, 12 (2025). https://doi.org/10.1186/s13040-024-00415-8.
[34] Arpit Garg, "How Natural Language Processing Framework Automate Business Requirement Elicitation," International Journal of Computer Trends and Technology (IJCTT), vol. 73, no. 5, pp. 47-50, 2025. Crossref, https://doi.org/10.14445/22312803/IJCTT-V73I5P107
[35] Vootkuri, C. Measuring Cloud Security Maturity: A Hybrid Approach Combining AI and Automation.
[36] Venkata SK Settibathini. Enhancing User Experience in SAP Fiori for Finance: A Usability and Efficiency Study. International Journal of Machine Learning for Sustainable Development, 2023/8, 5(3), PP 1-13, https://ijsdcs.com/index.php/IJMLSD/article/view/467