As states deal with re-opening and in some cases, re-closing, the reality is that for many organizations, remote work will play a significant role in business through 2020 and beyond. And so will increased cybercriminal activity, as demonstrated by a 131 percent increase in viruses and about 600 new phishing attacks a day when the pandemic started. Initially, we saw a number of phishing attacks directly related to COVID-19 (including ones purporting to be from the Centers for Disease Control and Prevention). Later, these attacks centered on stimulus packages and unemployment insurance, before evolving to subjects like vaccines and the stock market. Now, attackers are using a variety of relevant subjects –everything from “staycations” to boat rentals and food deliveries. And they aren’t just using email for these attempts – online ads and mobile apps are just a couple of other tactics used. Even if organizations have created more flexible remote-work policies to better accommodate the needs of their employees in the short term, these businesses must ensure that their teleworker strategies can support and secure remote connectivity long-term. Clarity from Crisis Due to the pandemic, CISOs initially faced the incredible pressure of maintaining business continuity with almost 100 percent of the workforce shifting to working from home, in just a couple of days. Many successful approaches that we have seen for this are based on a careful analysis of existing capabilities, so that…
0 0 govanguard https://govanguard.com/wp-content/uploads/2018/04/Header_Logo.png govanguard2020-09-18 13:56:002020-09-18 13:56:00Security Takeaways from the Great Work-from-Home Experiment
Our Standard Office Hours
Monday – Friday: 8:00AM – 5:00PM EDT
Saturday – Sunday: Closed
Where to Find Us
Data Privacy Notice
- – All product names, logos, and brands are property of their respective owners.
- – The use of these names, logos, and brands is for identification purposes only and does not imply endorsement.
- – Content syndication and aggregation of public information is solely for the purpose of identifying information security trends, all syndicated content contains source links to the content creator website. All content is owned by it’s respective content creators.
- – If you are an owner of some content and want it to be removed, please email email@example.com