Cyber Security Warnings From The Coronavirus Pandemic

The coronavirus pandemic has accelerated a remote working culture that started when high-speed Internet became available at home and in coffee shops. It’s now obvious that many more jobs can be done remotely than previously thought. COVID-19 has also accelerated distance learning and health services. 

Yet while most of the world is trying to deal with the COVID-19 pandemic, it seems hackers are not on lockdown. 

Compliance policies written for the workplace, the classroom as well the doctor’s office will need to be rewritten to reflect this new remote reality. 

Cyber criminals primarily make their money through fraud and extortion. What they do is to target financial systems, steal information to use in various fraud schemes and hold IT systems hostage through ransomware and other means. 

Now here are five ways an organisation can improve its cyber-security.

1. Ignore Phishing Emails
Phishing remains a popular, and effective, technique for attackers. It is an attempt to steal credentials and obtain sensitive information, often by an e-mail message containing a link to a seemingly legitimate Website. Phishing is the top threat action used in cyber-security breaches, according to Verizon’s 2020 Data Breach Investigations Report.

Verizon says in the Report, “As time goes on, it appears that attackers become increasingly efficient and lean more toward attacks such as phishing…”  To combat phishing, employees should know how official communications will be sent, treat unknown e-mails and links as suspicious, and have an easy way to alert their IT security team.

2. Up-Grade Cyber-Security Training for Employees and Management
Most cyber-security training revolves around workplace use, with passing mention of security best practices while on business travel. Remote work opens the door to risks posed by unknown Wi-Fi networks, shared workspaces, wireless printers, and similar technologies not vetted by IT security. 

Cyber security training should include best practices for remote work, covering: working environment, router security, use of a virtual private network (VPN), oversharing screens during online meetings, personal use of company computers, and IT support. As business need cyber security training and we at Cyber Security Intelligence recommend GoCyber training for all employees and management please contact Cyber Security Intelligence for a free trial.

3. Secure Collaboration Tools
Collaboration tools, such as online meeting services, are now the norm for remote teams to communicate. But as recent headlines have shown they can have security gaps if not configured properly. Meeting organisers should use built-in security features, such as waiting rooms, password protection, and other settings to control such things as participants document sharing and recording. 

Participants should not share meeting links publicly or with people who don’t have a need to know. Virtual meeting software should be regularly updated to the current version or have auto-update enabled. 
And very importantly employees and management should only accept meeting invites from expected and trusted sources.

4. Employ Distance Learning and Telemedicine
Education and healthcare changed dramatically when millions of students across the country found themselves suddenly unable to go to school and millions of patients could not see their doctors or receive the healthcare they needed. Both schools and hospitals have been prime targets for ransomware, where cyber-attackers encrypt or lock down a victim’s files/networks and demand a ransom to restore access, a threat only enhanced by COVID-19. 

To combat this, schools and hospitals should update their cyber-security risk assessment to encompass distance learning and telemedicine tools, as well as provide enhanced cyber-security training for educators and healthcare professionals.

5. Employ the NIST Cyber Security Framework
Improve cyber maturity by adopting the National Institutes of Standards and Technology (NIST) Cybersecurity Framework as a guide for building a strong cyber-security foundation. It provides exhaustive guidance around five steps, or functions, Identify, Protect, Detect, Respond & Recover, that could help transform an organisation’s cyber-security risk management posture from reactive to proactive. 

Beyond a response to COVID-19, adopting the NIST Cybersecurity Framework will demonstrate to customers and regulators that an organization takes cyber-security seriously.

COVID-19 is a wake-up call to the world that economies must adapt quickly to survive and prosper. It brought into sharp relief our dependence on technology and its vulnerabilities.

Continued vigilance is the ultimate lesson. Cyber criminals use every opportunity available to exploit weaknesses in cyber security, you should always make sure that you look for information about COVID-19 on trusted sources.

NIST:          Compliance Week:      Verizon:      TEISS

You Might Also Read: 

Cyber Security Market Slowdown Blamed On Coronavirus:
 

 

« First Winners Of £10m British Cyber Security Fund
Global Cyber Security Spend To Grow Only 2.8% »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Cyber Indemnity Solutions (CIS)

Cyber Indemnity Solutions (CIS)

CIS is an InsurTech company focused on licensing innovative cyber risk insurance solutions to the global insurance industry.

Ericsson

Ericsson

Ericsson is a leading provider of telecommunications services and network infrastructure solutions including all aspects of network security.

MSG Systems

MSG Systems

MSG are committed to intelligent IT and industry solutions and offer independent consulting on all aspects of information security.

InnoSec

InnoSec

InnoSec is a software manufacturer of cyber risk management technology.

ENEA Qosmos Division

ENEA Qosmos Division

Qosmos, a division of Enea, leads the market for IP traffic classification and network intelligence technology used in physical, SDN and NFV architectures.

Securely

Securely

Securely Ltd. is an IT consulting and services firm specializing in PKI solutions and products.

Versa Networks

Versa Networks

Versa is a software-defined networking vendor providing an end-to-end solution that both simplifies and secures the WAN/branch office network.

ThreatAdvice

ThreatAdvice

ThreatAdvice is a provider of cybersecurity education, awareness and threat intelligence.

Risk Ident

Risk Ident

RISK IDENT specializes in supporting enterprises in identifying and preventing criminal activity like payment fraud, account takeovers and identity theft.

Broadcom

Broadcom

Broadcom is a global technology leader that designs, develops and supplies a broad range of semiconductor and infrastructure software solutions.

Bleckwen

Bleckwen

Bleckwen is a proven fraud detection system that helps financial institutions build trust with customers.

Foretrace

Foretrace

Foretrace aims to prevent, assess, and contain the exposure of customer accounts, domains, and systems to malicious actors.

Axiata Digital Labs

Axiata Digital Labs

Axiata Digital Labs is the technology hub of Axiata Group Berhad Malaysia which is one of the leading groups in telecommunication in Asia.

Akto

Akto

Akto, the plug & play API security platform. Discover your APIs, run tests and find business logic vulnerabilities at ludicrous speed.

Tarlogic

Tarlogic

Tarlogic works to protect and defend your security with the highest quality technical team with next generation solutions to achieve the best protection.

National Information and Cybersecurity Council (NICC)

National Information and Cybersecurity Council (NICC)

National Information and Cybersecurity Council is a leading collaborative effort between Government of India and Industry to raise Cybersecurity awareness nationally.