Challenges of Managing Information Security during the Pandemic
Abstract
:1. Introduction
2. Background
2.1. Information and IT Security
2.2. Teleworking
- What rules apply to teleworking and the use of IT systems outside the organization?
- What capacity does the organization have for how many people can work remotely?
- Has the organization adopted continuity plans?
- Only allow users to run approved applications by blocking unauthorized software.
- Ensure the equipment employees use for work at home is up to date (hardware, operating systems, third-party applications, and antivirus signatures).
- All communication with the organization’s network and services should be secured by, for example, using VPN.
2.3. Increase of Incidents during the COVID-19 Pandemic
2.4. Research Gap and Motivation
3. Theoretical Framework
4. Methodology
4.1. Ethnography
4.2. Research Setting
4.3. Data Collection
4.3.1. Internal Documents
- Not to use insecure networks;
- To use a VPN for communication on the county network;
- Not to lend out any county devices;
- Not to connect any private devices to the county´s equipment;
- Always to lock or shut off the computer when it is not in use;
- Not to use other printers than the ones in the office;
- To be mindful of where in the home to telework (i.e., not angled towards a window).
4.3.2. Diaries
4.3.3. Focus Groups
4.4. Data Analysis
5. Results
5.1. Challenges with the Technical Security
We get many questions about platforms and whether they are secure or not and what types of information classes they can be used for. And not least considering that we currently have a Skype to Teams transition, which is admittedly paused, and that is one of the reasons why we used Cisco VMR sometimes because we at least got it verbally that it is more secure because the IT environment is here [administered and located within the county and not outsourced].
If there is a print queue and paper come out even if the computer is locked.
There may be a document waiting in the printer queue that is patient-sensitive and that could be printed with the other documents that the family member wanted to print out.
5.2. Challenges with the Policies and Regulations
Develop a more structured and organized work with information and education in information security for the employees. And how we should act when we work from home.
We belong to a group that has better knowledge of information security than others, but it is important to continue to keep the dialogue open and remind each other of what applies.
Perhaps we should also be better at transferring knowledge, especially to new employees. Then we also need to think about how we can help each other in work on information security when we are not sitting in the same corridor.
5.3. Challenges with the Information Security Awareness
These are the kind of things that you sit at work and have paperwork on patients that you’ve been given paper, so you can’t take them home. The papers are going to stay at work and be locked up. Similarly, it should be with a laptop. You are not allowed to download patient information on a laptop and bring them home to work with them. Then you’ve taken them out of the workplace. I don’t think people are aware that this is the case. There is no awareness of it.
I have reflected about how I know who is in the meeting and that no one else is listening. The rooms [meetings] do not have four walls in the same way as physical meetings.
Considering how difficult it is for healthcare departments to secure information when people are at work, for example, to lock the computer when you go to lunch, it will not be easier when people work from home.
5.4. Challenges with the Preparedness
I do not think that instructions or recommendations on how to work at home have kept pace with the change in the work environment. I think there is a lack of information material.
Like a little all the time depending on how you define information security. It is infrequent during a day that it is stated that ‘this is about information security’.
I have been thinking that it will never be the same after the pandemic because many will not come back [to work in the office].
On the other hand, I think it is something that you have to work with and put in place rules about this because I am convinced that sitting at home and working has come to stay. I think there will be a lot of this in the future. And we notice that using these tools for meetings in the region has made it much easier. You don’t have to go to meet and such, but then you actually need to reason about the prerequisites to be able to do it.
6. Discussion and Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Folkhälsomyndigheten Nytt Coronavirus Upptäckt i Kina—Folkhälsomyndigheten. Available online: http://www.folkhalsomyndigheten.se/nyheter-och-press/nyhetsarkiv/2020/januari/nytt-coronavirus-upptackt-i-kina/ (accessed on 28 August 2021).
- Folkhälsomyndigheten Personer över 70 bör Begränsa Sociala Kontakter Tills Vidare—Folkhälsomyndigheten. Available online: http://www.folkhalsomyndigheten.se/nyheter-och-press/nyhetsarkiv/2020/mars/personer-over-70-bor-begransa-sociala-kontakter-tills-vidare/ (accessed on 28 August 2021).
- Lanz, J.; Sussman, B. ICYMI|Information Security Program Management in a COVID-19 World. Available online: https://www.cpajournal.com/2020/08/18/icymi-information-security-program-management-in-a-covid-19-world/ (accessed on 28 August 2021).
- MSB Arbeta Säkert på Distans. Available online: https://www.msb.se/sv/amnesomraden/informationssakerhet-cybersakerhet-och-sakra-kommunikationer/arbeta-sakert-pa-distans/ (accessed on 29 August 2021).
- Cert Säkerhet Och Infrastruktur Vid Arbete Hemifrån [uppdaterad 26 March 2020]—www.cert.se. Available online: https://www.cert.se/2020/03/sakerhet-och-infrastruktur-vid-arbete-hemifran (accessed on 28 August 2021).
- Fredriksson, A.; Wolf-Watz, O. Kartläggning Och Analys av Förutsättningar för Arbete Hemifrån under Coronapandemin; Myndigheten för Arbetsmiljökunskap: Gävle, Sweden, 2021; p. 52. [Google Scholar]
- Pranggono, B.; Arabo, A. COVID-19 Pandemic Cybersecurity Issues. Internet Technol. Lett. 2021, 4, e247. [Google Scholar] [CrossRef]
- Alavi, R. WFH: Think Before You Click. ITNOW 2020, 62, 40–41. [Google Scholar] [CrossRef]
- Botha, R.; Furnell, S. Facing up to Security and Privacy in Online Meetings. Netw. Secur. 2021, 2021, 7–13. [Google Scholar] [CrossRef]
- Furnell, S.; Shah, J.N. Home Working and Cyber Security—An Outbreak of Unpreparedness? Comput. Fraud Secur. 2020, 2020, 6–12. [Google Scholar] [CrossRef]
- Talib, S.; Clarke, N.L.; Furnell, S.M. An Analysis of Information Security Awareness within Home and Work Environments. In Proceedings of the 2010 International Conference on Availability, Reliability and Security, Krakow, Poland, 15–18 February 2010; pp. 196–203. [Google Scholar]
- Babbs, A. How to Leverage Data Security in a Post-Covid World. Comput. Fraud Secur. 2020, 2020, 8–11. [Google Scholar] [CrossRef]
- He, Y.; Aliyu, A.; Evans, M.; Luo, C. Health Care Cybersecurity Challenges and Solutions Under the Climate of COVID-19: Scoping Review. J. Med. Internet Res. 2021, 23, e21747. [Google Scholar] [CrossRef]
- Weil, T.; Murugesan, S. IT Risk and Resilience—Cybersecurity Response to COVID-19. IT Prof. 2020, 22, 4–10. [Google Scholar] [CrossRef]
- Von Solms, R.; van Niekerk, J. From Information Security to Cyber Security. Comput. Secur. 2013, 38, 97–102. [Google Scholar] [CrossRef]
- Isaksson, J.; Sanne, T. Smarta Kort En del av en intelligent IT-lösning i hälso-och sjukvården? Högsk. Jönköp 2006, 104. Available online: https://www.semanticscholar.org/paper/Smarta-Kort-%3A-En-del-av-en-intelligent-IT-l%C3%B6sning-i-Isaksson-Sanne/a70129e3c3cc3cd0096ff5dcdeec9aa55d60654e (accessed on 25 October 2021).
- International Organization for Standardization ISO/IEC 27000: 2018. Available online: https://www-sis-se.libraryproxy.his.se/api/document/get/80001198 (accessed on 28 August 2021).
- Whitman, M.E.; Mattord, H.J. Principles of Information Security, 4th ed.; Cengage Learning: Boston, MA, USA, 2014; ISBN 978-1-111-13821-9. [Google Scholar]
- Åhlfeldt, R.-M.; Spagnoletti, P.; Sindre, G. Improving the Information Security Model by using TFI. In New Approaches for Security, Privacy and Trust in Complex Environments; Venter, H., Eloff, M., Labuschagne, L., von Solms, R., Eds.; IFIP International Federation for Information Processing; Springer: Boston, MA, USA, 2007; Volume 232, pp. 73–84. ISBN 978-0-387-72366-2. [Google Scholar]
- Reid, R.; Van Niekerk, J. From Information Security to Cyber Security Cultures. In Proceedings of the 2014 Information Security for South Africa, Johannesburg, South Africa, 13–14 August 2014; pp. 1–7. [Google Scholar]
- International Organization for Standardization ISO/IEC 27002: 2017. Available online: https://www-sis-se.libraryproxy.his.se/api/document/get/8025294 (accessed on 28 August 2021).
- Mihailović, A.; Cerović Smolović, J.; Radević, I.; Rašović, N.; Martinović, N. COVID-19 and Beyond: Employee Perceptions of the Efficiency of Teleworking and Its Cybersecurity Implications. Sustainability 2021, 13, 6750. [Google Scholar] [CrossRef]
- Mahr, A.; Cichon, M.; Mateo, S.; Grajeda, C.; Baggili, I. Zooming into the Pandemic! A Forensic Analysis of the Zoom Application. Forensic Sci. Int. Digit. Investig. 2021, 36, 301107. [Google Scholar] [CrossRef]
- Faulds, D.J.; Raju, P.S. The Work-from-Home Trend: An Interview with Brian Kropp. Bus. Horiz. 2021, 64, 29–35. [Google Scholar] [CrossRef] [PubMed]
- Carrapico, H.; Farrand, B. Discursive Continuity and Change in the Time of COVID-19: The Case of EU Cybersecurity Policy. J. Eur. Integr. 2020, 42, 1111–1126. [Google Scholar] [CrossRef]
- MSB. Informationssäkerhet För Dig Som Arbetar Hemma. 2020. Available online: https://www.informationssakerhet.se/siteassets/nyheter/informationssakerhet-for-dig-som-arbetar-hemma--rad-fran-msb.pdf (accessed on 28 August 2021).
- MSB. Till Dig Som Samordnar Organisationens Informationssäkerhet När Flera Arbetar På Distans. 2020. Available online: https://www.informationssakerhet.se/siteassets/nyheter/rad-till-dig-som-samordnar-organisationens-informationssakerhet-nar-flera-arbetar-pa-distans.pdf (accessed on 28 August 2021).
- Humla, P.-O. Cyberattacker når Rekordnivåer under COVID-19. Available online: https://home.kpmg/se/sv/home/nyheterrapporter/2020/04/cyberattacker-okar-i-sparen-av-covid-19.html (accessed on 28 August 2021).
- Hurst, A. Over a Quarter of Cyber Security Incidents Related to COVID-19—NCSC. Inf. Age 2020. Available online: https://www.information-age.com/over-quarter-cyber-security-incidents-related-covid-19-ncsc-123492522/ (accessed on 25 October 2021).
- Goldroth, A. Cyberattacker-Mot-Sjukvarden-i-Sverige-Okar-Med-32-Procent. Available online: https://it-halsa.se/cyberattacker-mot-sjukvarden-i-sverige-okar-med-32/ (accessed on 28 August 2021).
- Lallie, H.S.; Shepherd, L.A.; Nurse, J.R.C.; Erola, A.; Epiphaniou, G.; Maple, C.; Bellekens, X. Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic. Comput. Secur. 2021, 105, 102248. [Google Scholar] [CrossRef]
- Okereafor, K.; Manny, P. Understanding Cybersecurity Challenges of Telecommuting and Video Conferencing in the COVID-19 Pandemic.Pdf. Int. J. IT Eng. IJITE 2020, 8, 13–23. [Google Scholar] [CrossRef]
- Georgiadou, A.; Mouzakitis, S.; Askounis, D. Working from Home during COVID-19 Crisis: A Cyber Security Culture Assessment Survey. Secur. J. 2021. [Google Scholar] [CrossRef]
- Grigorescu, A.; Mocanu Nicolae, A. Teleworking Perspectives for Romanian SMEs after the COVID-19 Pandemic. Manag. Dyn. Knowl. Econ. 2020, 8, 383–399. [Google Scholar] [CrossRef]
- Tokarchuk, O.; Gabriele, R.; Neglia, G. Teleworking during the Covid-19 Crisis in Italy: Evidence and Tentative Interpretations. Sustainability 2021, 13, 2147. [Google Scholar] [CrossRef]
- IBM Cost of Insider Threats. Available online: https://www.ibm.com/security/digital-assets/services/cost-of-insider-threats/ (accessed on 20 September 2021).
- Chapman, P. Defending against Insider Threats with Network Security’s Eighth Layer. Comput. Fraud Secur. 2021, 2021, 8–13. [Google Scholar] [CrossRef]
- Eiza, M.; Okeke, R.I.; Dempsey, J.; Ta, V.-T. Keep Calm and Carry on with Cybersecurity @Home: A Framework for Securing Homeworking IT Environment. Int. J. Cyber Situat. Aware. 2021, 5, 1–25. [Google Scholar] [CrossRef]
- Ahmad, T. Corona Virus (COVID-19) Pandemic and Work from Home: Challenges of Cybercrimes and Cybersecurity; Social Science Research Network: Rochester, NY, USA, 2020. [Google Scholar]
- Naidoo, R. A Multi-Level Influence Model of COVID-19 Themed Cybercrime. Eur. J. Inf. Syst. 2020, 29, 306–321. [Google Scholar] [CrossRef]
- Hijji, M.; Alam, G. A Multivocal Literature Review on Growing Social Engineering Based Cyber-Attacks/Threats During the COVID-19 Pandemic: Challenges and Prospective Solutions. IEEE Access 2021, 9, 7152–7169. [Google Scholar] [CrossRef]
- Crossler, R.E.; Johnston, A.C.; Lowry, P.B.; Hu, Q.; Warkentin, M.; Baskerville, R. Future Directions for Behavioral Information Security Research. Comput. Secur. 2013, 32, 90–101. [Google Scholar] [CrossRef]
- Vroom, C.; von Solms, R. Towards Information Security Behavioral Compliance. Comput. Secur. 2004, 23, 191–198. [Google Scholar] [CrossRef]
- Niemimaa, E.; Niemimaa, M. Information Systems Security Policy Implementation in Practice: From Best Practices to Situated Practices. Eur. J. Inf. Syst. 2017, 26, 1–20. [Google Scholar] [CrossRef]
- Njenga, K.; Brown, I. Conceptualising Improvisation in Information Systems Security. Eur. J. Inf. Syst. 2012, 21, 592–607. [Google Scholar] [CrossRef]
- Webb, J.; Ahmad, A.; Maynard, S.B.; Shanks, G. Foundations for an Intelligence-Driven Information Security Risk-Management System. J. Inf. Technol. Theory Appl. JITTA 2016, 17, 25–51. [Google Scholar]
- Feldman, M.S.; Orlikowski, W.J. Theorizing Practice and Practicing Theory. Organ. Sci. 2011, 22, 1240–1253. [Google Scholar] [CrossRef] [Green Version]
- Jarzabkowski, P. Strategy as Practice: An Activity Based Approach; Sage: London, UK, 2005. [Google Scholar]
- Smets, M.; Morris, T.; Greenwood, R. From Practice to Field: A Multilevel Model of Practice-Driven Institutional Change. Acad. Manag. J. 2012, 55, 877–904. [Google Scholar] [CrossRef] [Green Version]
- Leonardi, P.M. Theoretical Foundations for the Study of Sociomateriality. Inf. Organ. 2013, 23, 59–76. [Google Scholar] [CrossRef]
- Carlile, P.R. Transferring, Translating, and Transforming: An Integrative Framework for Managing Knowledge Across Boundaries. Organ. Sci. 2004, 15, 555–568. [Google Scholar] [CrossRef] [Green Version]
- Nelson, R.R. IT Project Management: Infamous Failures, Classic Mistakes, and Best Practices. MIS Q. Exec. 2007, 6, 67–78. [Google Scholar]
- Orlikowski, W.J. Knowing in Practice: Enacting a Collective Capability in Distributed Organizing. Organ. Sci. 2002, 13, 249–273. [Google Scholar] [CrossRef] [Green Version]
- Bergström, E.; Lundgren, M.; Ericson, Å. Revisiting Information Security Risk Management Challenges: A Practice Perspective. Inf. Comput. Secur. 2019, 27, 358–372. [Google Scholar] [CrossRef]
- Pridmore, J.; Oomen, T.A.P. A Practice-Based Approach to Security Management: Materials, Meaning and Competence for Trainers of Healthcare Cybersecurity. In International Security Management: New Solutions to Complexity; Jacobs, G., Suojanen, I., Horton, K.E., Bayerl, P.S., Eds.; Advanced Sciences and Technologies for Security Applications; Springer International Publishing: Cham, Switzerland, 2021; pp. 357–369. ISBN 978-3-030-42523-4. [Google Scholar]
- Soomro, Z.A.; Shah, M.H.; Ahmed, J. Information Security Management Needs More Holistic Approach: A Literature Review. Int. J. Inf. Manag. 2016, 36, 215–225. [Google Scholar] [CrossRef]
- Siponen, M. Six Design Theories for IS Security Policies and Guidelines. J. Assoc. Inf. Syst. 2006, 7, 19. [Google Scholar] [CrossRef] [Green Version]
- Leedy, P.D.; Ormrod, J.E. Practical Research: Planning and Design, 11th ed.; Pearson: Boston, MA, USA, 2016; ISBN 978-0-13-374132-2. [Google Scholar]
- Myers, M.D. Qualitative Research in Information Systems. MIS Q. 1997, 21, 241–242. [Google Scholar] [CrossRef]
- Oehme, R. Övergripande Studie av Offentlig It-Drift (Informationssäkerhet) i Västra Götaland; Knowit: Stockholm, Sweden, 2020; p. 61. [Google Scholar]
- Eisner, E.W. The Enlightened Eye: Qualitative Inquiry and the Enhancement of Educational Practice; Teachers College Press: New York, NY, USA, 2017; ISBN 978-0-8077-5824-3. [Google Scholar]
- Bowen, G. Document Analysis as a Qualitative Research Method. Qual. Res. J. 2009, 9, 27–40. [Google Scholar] [CrossRef] [Green Version]
- Gross, J.M.S. Document Analysis. In The SAGE Encyclopedia of Educational Research, Measurement, and Evaluation; Frey, B.B., Ed.; SAGE Publications, Inc.: Thousand Oaks, CA, USA, 2018; ISBN 978-1-5063-2615-3. [Google Scholar]
- Labuschagne, A. Qualitative Research—Airy Fairy or Fundamental? Qual. Rep. 2003, 8, 100–103. [Google Scholar] [CrossRef]
- Rapley, T. Doing Conversation, Discourse and Document Analysis; SAGE: Thousand Oaks, CA, USA, 2018; ISBN 978-1-5264-2617-8. [Google Scholar]
- Belanger, F. Theorizing in Information Systems Research Using Focus Groups. Australas. J. Inf. Syst. 2012, 17, 109–112. [Google Scholar] [CrossRef] [Green Version]
- Hennink, M.M. Focus Group Discussions: Understanding Qualitative Research; Oxford University Press: New York, NY, USA, 2014; ISBN 978-0-19-985616-9. [Google Scholar]
- Sobreperez, P. Using Plenary Focus Groups in Information Systems Research: More than a Collection of Interviews. Electron. J. Bus. Res. Methods 2008, 6, 209–216. [Google Scholar]
- Tausch, A.P.; Menold, N. Methodological Aspects of Focus Groups in Health Research: Results of Qualitative Interviews With Focus Group Moderators. Glob. Qual. Nurs. Res. 2016, 3, 9–11. [Google Scholar] [CrossRef] [Green Version]
- Strauss, A.L.; Corbin, J.M. Basics of Qualitative Research: Grounded Theory Procedure and Techniques, 2nd ed.; SAGE: Thousand Oaks, CA, USA, 1998; ISBN 978-0-585-38332-3. [Google Scholar]
- Krueger, R.A. Designing and Conducting Focus Group Interviews. Soc. Anal. Sel. Tools Tech. 2001, 36, 4–23. [Google Scholar]
- Jefferson How to Create Effective Focus Group Questions. Available online: https://online.jefferson.edu/business/create-effective-focus-group-questions/ (accessed on 28 August 2021).
- Geertz, C. The Interpretation of Cultures: Selected Essays; Basic Books: New York, NY, USA, 1973. [Google Scholar]
- Braun, V.; Clarke, V. Using Thematic Analysis in Psychology. Qual. Res. Psychol. 2006, 3, 77–101. [Google Scholar] [CrossRef] [Green Version]
- Niemimaa, E. A Practice Lens for Understanding the Organizational and Social Challenges of Information Security Management. In Proceedings of the 20th Pacific Asia Conference on Information Systems (PACIS 2016), Chiayi, Taiwan, 27 June 2016. [Google Scholar]
- Baskerville, R.; Siponen, M. An Information Security Meta—Policy for Emergent Organizations. Logist. Inf. Manag. 2002, 15, 337–346. [Google Scholar] [CrossRef] [Green Version]
- Brown, J.S.; Duguid, P. Organizational Learning and Communities-of-Practice: Toward a Unified View of Working, Learning, and Innovation. Organ. Sci. 1991, 2, 40–57. [Google Scholar] [CrossRef]
- Bromley, P.; Powell, W.W. From Smoke and Mirrors to Walking the Talk: Decoupling in the Contemporary World. Acad. Manag. Ann. 2012, 6, 483–530. [Google Scholar] [CrossRef]
- Reckwitz, A. Toward a Theory of Social Practices: A Development in Culturalist Theorizing. Eur. J. Soc. Theory 2002, 5, 243–263. [Google Scholar] [CrossRef]
- Siponen, M.T. An Analysis of the Traditional IS Security Approaches: Implications for Research and Practice. Eur. J. Inf. Syst. 2005, 14, 303–315. [Google Scholar] [CrossRef]
Theme | Challenge | Type of Challenge |
---|---|---|
Preparedness | An unstable and undimensioned VPN | IT security |
Information security awareness | Employees have different levels of knowledge regarding a suitable home-office set-up | Information security |
Technical security | Difficult for employees to control the unpredictable nature of updates in the home-office environment, i.e., router firmware | IT security |
Technical security | Ways of limiting the expansion of the attack surface | IT security |
Preparedness | Concerns that employees work with insecure private devices due to lack of company-owned devices for employees needing to telework | IT security |
Information security awareness | The digital space does not have four walls | Information security |
Policies and regulations | Lack of instructions on the proper way of teleworking | Information security |
Information security awareness | Too much focus on IT and not enough on behavior | Information security |
Technical security | Access email and some internal websites with insecure devices | IT security |
Technical security | Monitoring unauthorized communication channels | IT security |
Information security awareness | Control the surrounding environment of the teleworker | Information security |
Policies and regulations | Lack of defined rules related to information security when teleworking | Information security |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Mannebäck, E.; Padyab, A. Challenges of Managing Information Security during the Pandemic. Challenges 2021, 12, 30. https://doi.org/10.3390/challe12020030
Mannebäck E, Padyab A. Challenges of Managing Information Security during the Pandemic. Challenges. 2021; 12(2):30. https://doi.org/10.3390/challe12020030
Chicago/Turabian StyleMannebäck, Emelie, and Ali Padyab. 2021. "Challenges of Managing Information Security during the Pandemic" Challenges 12, no. 2: 30. https://doi.org/10.3390/challe12020030
APA StyleMannebäck, E., & Padyab, A. (2021). Challenges of Managing Information Security during the Pandemic. Challenges, 12(2), 30. https://doi.org/10.3390/challe12020030