Cyber Security Warnings From The Coronavirus Pandemic

The coronavirus pandemic has accelerated a remote working culture that started when high-speed Internet became available at home and in coffee shops. It’s now obvious that many more jobs can be done remotely than previously thought. COVID-19 has also accelerated distance learning and health services. 

Yet while most of the world is trying to deal with the COVID-19 pandemic, it seems hackers are not on lockdown. 

Compliance policies written for the workplace, the classroom as well the doctor’s office will need to be rewritten to reflect this new remote reality. 

Cyber criminals primarily make their money through fraud and extortion. What they do is to target financial systems, steal information to use in various fraud schemes and hold IT systems hostage through ransomware and other means. 

Now here are five ways an organisation can improve its cyber-security.

1. Ignore Phishing Emails
Phishing remains a popular, and effective, technique for attackers. It is an attempt to steal credentials and obtain sensitive information, often by an e-mail message containing a link to a seemingly legitimate Website. Phishing is the top threat action used in cyber-security breaches, according to Verizon’s 2020 Data Breach Investigations Report.

Verizon says in the Report, “As time goes on, it appears that attackers become increasingly efficient and lean more toward attacks such as phishing…”  To combat phishing, employees should know how official communications will be sent, treat unknown e-mails and links as suspicious, and have an easy way to alert their IT security team.

2. Up-Grade Cyber-Security Training for Employees and Management
Most cyber-security training revolves around workplace use, with passing mention of security best practices while on business travel. Remote work opens the door to risks posed by unknown Wi-Fi networks, shared workspaces, wireless printers, and similar technologies not vetted by IT security. 

Cyber security training should include best practices for remote work, covering: working environment, router security, use of a virtual private network (VPN), oversharing screens during online meetings, personal use of company computers, and IT support. As business need cyber security training and we at Cyber Security Intelligence recommend GoCyber training for all employees and management please contact Cyber Security Intelligence for a free trial.

3. Secure Collaboration Tools
Collaboration tools, such as online meeting services, are now the norm for remote teams to communicate. But as recent headlines have shown they can have security gaps if not configured properly. Meeting organisers should use built-in security features, such as waiting rooms, password protection, and other settings to control such things as participants document sharing and recording. 

Participants should not share meeting links publicly or with people who don’t have a need to know. Virtual meeting software should be regularly updated to the current version or have auto-update enabled. 
And very importantly employees and management should only accept meeting invites from expected and trusted sources.

4. Employ Distance Learning and Telemedicine
Education and healthcare changed dramatically when millions of students across the country found themselves suddenly unable to go to school and millions of patients could not see their doctors or receive the healthcare they needed. Both schools and hospitals have been prime targets for ransomware, where cyber-attackers encrypt or lock down a victim’s files/networks and demand a ransom to restore access, a threat only enhanced by COVID-19. 

To combat this, schools and hospitals should update their cyber-security risk assessment to encompass distance learning and telemedicine tools, as well as provide enhanced cyber-security training for educators and healthcare professionals.

5. Employ the NIST Cyber Security Framework
Improve cyber maturity by adopting the National Institutes of Standards and Technology (NIST) Cybersecurity Framework as a guide for building a strong cyber-security foundation. It provides exhaustive guidance around five steps, or functions, Identify, Protect, Detect, Respond & Recover, that could help transform an organisation’s cyber-security risk management posture from reactive to proactive. 

Beyond a response to COVID-19, adopting the NIST Cybersecurity Framework will demonstrate to customers and regulators that an organization takes cyber-security seriously.

COVID-19 is a wake-up call to the world that economies must adapt quickly to survive and prosper. It brought into sharp relief our dependence on technology and its vulnerabilities.

Continued vigilance is the ultimate lesson. Cyber criminals use every opportunity available to exploit weaknesses in cyber security, you should always make sure that you look for information about COVID-19 on trusted sources.

NIST:          Compliance Week:      Verizon:      TEISS

You Might Also Read: 

Cyber Security Market Slowdown Blamed On Coronavirus:
 

 

« First Winners Of £10m British Cyber Security Fund
Global Cyber Security Spend To Grow Only 2.8% »

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

SMLR Group

SMLR Group

SMLR Group is a full service Cybersecurity and Cybergovernance consulting firm

Security Research Labs

Security Research Labs

Security Research Labs is a Berlin-based hacking research collective and consulting think tank.

SOTI

SOTI

SOTI is an industry leader in Enterprise Mobility Management (EMM).

AirCUVE

AirCUVE

AirCUVE provide authentication and access control solutions for networks and mobile security.

Cyber Security Capital (CS^)

Cyber Security Capital (CS^)

Cyber Security Capital is a consultancy helping to mobilise and empower individuals, corporate leaders and entrepreneurs in cyber security.

App-Ray

App-Ray

App-Ray provides fully automated security analysis of mobile applications to find security issues, privacy breaches and data leaking potentials.

GraVoc

GraVoc

GraVoc is a technology-consulting firm committed to solving business problems for customers through the development, implementation, & support of technology-based solutions.

SANS CyberStart

SANS CyberStart

SANS CyberStart is a unique and innovative suite of tools and games designed to introduce children and young adults to the field of cyber security.

Naval Dome

Naval Dome

Naval Dome provides the first maritime multilayer cyber defense solution for mission critical onboard systems.

Spark Security

Spark Security

Spark Security is a cyber security consultancy providing affordable security testing services for small and medium-sized enterprises (SMEs).

EOL IT Services

EOL IT Services

EOL IT Services is the UK’s most accredited provider of IT Asset Disposal (ITAD), Lifecycle Services and Data Destruction.

Labs/02

Labs/02

Labs/02 is a seed-stage incubator with a mission to advance cutting-edge technology in innovative areas including AI, deep learning, autonomous transportation, and smart cities.

Smart Hive

Smart Hive

Smart Hive has created a platform that will allow organizations to share real-time, relevant and actionable threat intelligence among each other while maintaining confidentiality.

Secure Digital Solutions (SDS)

Secure Digital Solutions (SDS)

Secure Digital Solutions is a leading consulting firm in the business of information security providing cyber security program strategy, enterprise risk and compliance, and data privacy.