The Impact of Covid-19 On Cyber Security Threats

The coronavirus pandemic of late 2019 and 2020 has changed the way some businesses will operate forever. Although there was an increased take-up of flexible working practices and working from home among many organisations in recent years, the threat of Covid-19 certainly made many businesses speed up their rate of change. 

Of course, there have been numerous challenges that have needed to be surmounted in order to make cooperative work function effectively when a workforce is so dispersed, as has been the case during the pandemic. Many of these challenges have been met by the appropriate use of technological solutions. After all, in the digital age, modern data communications systems have enabled businesses to keep operating productively when, in the past, they may have faced very significant disruption. 

And yet, the increased uptake in remote working technologies has led to some noticeable issues with data security. How has the pandemic impacted on cybersecurity and what are the major threats that Cyber Security Providers UAE and around the world must ensure they guard against today?

Phishing, Malspams and Ransomware

With many criminals in a state of lockdown – just like the rest of the population – the majority of professional cyber security monitoring services noted a significant upturn in malware in 2020. With more people accessing their work via email servers and cloud-enabled data sharing points, so cyber criminals saw an opportunity. To begin with, phishing scams and the deployment of ransomware became more commonplace in 2020. The use of targeted spam for malicious purposes against businesses also became much more prevalent during the crisis.

Network Security and Remote Working Operations

With so many people connecting to centralised servers from home, so the usual cyber security that protects a network from within became harder to manage. Firewalls needed to allow greater authorised access from outside, for example, and this often meant needing ramp up authentication procedures. If not, then it became easier for spyware to secretly snoop on what was going on behind a firewall by monitoring a connected terminal outside of it.

Data Handling Outside of the Office

Not all of the cyber threats during the pandemic were trying to use only software either. Some focussed on old computers and legacy equipment that might be being used in remote locations. Generally speaking, IT teams that didn't manage the use of such equipment properly often found them to be susceptible to unauthorised access. Whether this is because they held data on removable drives, because old equipment was not properly destroyed or simply because their password protection was weak, Covid-19 meant it was harder to keep on top of hardware susceptibilities of all kinds.

The Appropriate Use of Cloud Services

Another big opportunity for cyber criminals was the augmented use of cloud-based services during the pandemic to store information as wide-ranging as customer records to financial reports. Unless the servers running such services were, themselves, fully secure against potential attack, their adoption as a means of maintaining social distancing made some businesses more exposed to data losses (DLP)  and privacy breaches. Even something as seemingly as innocent as a cloud-enabled spreadsheet sharing service has led to significant problems among some organisations since their reliance on cloud services became more commonplace.

Article Contributed By CyberGate Defense

You Might Also Read: 

Criminals Have Ramped Up Covid-19 Related Attacks:

 

« Advanced Threat Detection And Response: Critical Steps
The Different Types of Malware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Cybsecurity Foundation (CSF)

Cybsecurity Foundation (CSF)

Cybsecurity is a non-profit NGO, which aims to work on improvement of security levels in the Polish cyberspace.

CERT-IS

CERT-IS

CERT-IS is the national Computer Emergency Response Team for Iceland.

Fraunhofer Institute for Secure Information Technology (SIT)

Fraunhofer Institute for Secure Information Technology (SIT)

Fraunhofer SIT is a research centre specialising in all areas of IT security.

ComCode

ComCode

ComCode provides consulting services and solutions in the area of digitization and cyber security for mid-sized and big businesses.

Sandline Discovery

Sandline Discovery

Sandline Discovery provides digital forensics, eDiscovery solutions, managed review and litigation consulting services.

DOS

DOS

DOS is an Ecuadorian company with 3 decades of presence in the market and extensive experience in the planning, management and execution of IT Service Integration Projects.

Wise-Mon

Wise-Mon

Wise-Mon is expert in its field of network monitoring and control. We give solutions to huge organizations with tens of thousands of ports, as well as small companies with one switch.

Radically Open Security

Radically Open Security

Radically Open Security is the world's first not-for-profit computer security consultancy company.

SAP National Security Services (NS2)

SAP National Security Services (NS2)

SAP NS2 are dedicated to delivering the best of SAP innovation, from cloud to predictive analytics; machine learning to data fusion.

Axxum Technologies

Axxum Technologies

Axxum Technologies is a premier provider of Network Communications and Information Technology Security Solutions.

Fasken

Fasken

Fasken is one of the largest business law firms in Canada and a recognized leader in privacy and cybersecurity law.

Ethyca

Ethyca

Ethyca builds automated data privacy infrastructure and tools for developers and privacy teams to easily build products that comply with GDPR, CCPA Privacy Regulations.

usecure

usecure

usecure is a global provider of computer-based cyber security awareness training, offering the market’s most time-efficient, cost-effective and admin-lite solution for reducing insider threats.

Digital Boundary Group (DBG)

Digital Boundary Group (DBG)

Digital Boundary Group (DBG) is an information technology security assurance services firm providing information technology security auditing and compliance assessment services to clients worldwide.

Resourcive

Resourcive

Resourcive is the first Value Added Sourcing “VAS” consultancy. We deliver strategic IT sourcing solutions to mid-market and enterprise clients.

CYGNVS

CYGNVS

CYGNVS is a guided cyber crisis response platform providing anytime, anyplace access. A SaaS platform for cyber crisis management – a safe way to connect and control your response.