{"title":"应对新冠肺炎疫情下小企业网络安全风险","authors":"Justino Lourenço, Fernando L. Almeida","doi":"10.4018/ijcre.309687","DOIUrl":null,"url":null,"abstract":"COVID-19 affects people and companies. They are experiencing dramatic changes in work processes, communication processes, and customer management. This whole new paradigm has brought new challenges to organizations, particularly to small and medium enterprises, which have limited budgets and resources to ensure their technological infrastructure. This study aims to explore how these companies have adapted to the challenges posed by COVID-19 in their compliance practices with general data protection regulation (GDPR), auditing, and forensic security analysis. Furthermore, this study analyzes the risks that have been amplified in this period and identifies new vulnerabilities that have arisen from increased dependence on information technology in a period when most organizations have their employees in teleworking.","PeriodicalId":324985,"journal":{"name":"International Journal of Cyber Research and Education","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Address Cybersecurity Risks Due to COVID-19 in Small Business Environments\",\"authors\":\"Justino Lourenço, Fernando L. Almeida\",\"doi\":\"10.4018/ijcre.309687\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"COVID-19 affects people and companies. They are experiencing dramatic changes in work processes, communication processes, and customer management. This whole new paradigm has brought new challenges to organizations, particularly to small and medium enterprises, which have limited budgets and resources to ensure their technological infrastructure. This study aims to explore how these companies have adapted to the challenges posed by COVID-19 in their compliance practices with general data protection regulation (GDPR), auditing, and forensic security analysis. Furthermore, this study analyzes the risks that have been amplified in this period and identifies new vulnerabilities that have arisen from increased dependence on information technology in a period when most organizations have their employees in teleworking.\",\"PeriodicalId\":324985,\"journal\":{\"name\":\"International Journal of Cyber Research and Education\",\"volume\":\"27 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Cyber Research and Education\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/ijcre.309687\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Cyber Research and Education","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/ijcre.309687","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Address Cybersecurity Risks Due to COVID-19 in Small Business Environments
COVID-19 affects people and companies. They are experiencing dramatic changes in work processes, communication processes, and customer management. This whole new paradigm has brought new challenges to organizations, particularly to small and medium enterprises, which have limited budgets and resources to ensure their technological infrastructure. This study aims to explore how these companies have adapted to the challenges posed by COVID-19 in their compliance practices with general data protection regulation (GDPR), auditing, and forensic security analysis. Furthermore, this study analyzes the risks that have been amplified in this period and identifies new vulnerabilities that have arisen from increased dependence on information technology in a period when most organizations have their employees in teleworking.