
As COVID-19 propagates, companies are reacting, and many are initiating work from home (“WFH”) policies. While it might be a common practice for some businesses, many others are scrambling, and cyber criminals are ready, using WFH as a nexus into the wider business environment. This makes WFH employees and systems vulnerable.
Cyber attackers and Nation State Actors (someone who aggressively targets and aims to gain access to public and private sector networks to compromise critical systems availability) increase during a time of crisis, using the crisis as a strategic advantage.
WFH allows employees to bring their work home with them and operate remotely, often times allowing employees to use their own devices, from tablets, to phones, to computers, to do their work. This is referred to as Bring Your Own Device (“BYOD”) – or in the cybersecurity world, Bring Your Own Disaster. Employees are also using their own wireless internet which may not be as secure as the connection in the office. Additionally, many devices, both for work and leisure, are utilizing the same network.
Since January, more than 4,000 coronavirus-themed web domains have come about. Many of which are likely to have malicious intent and have a goal of luring victims to click on dangerous links. For example, Iran is desperate to maintain power under the crippling economic sanctions and through the COVID-19 pandemic. In the midst of the pandemic, Iran is orchestrating attacks on US interests, mostly through proxies, as well as a drastic increase of cyber-attacks against businesses, hospitals, etc.
Approximately 75% of backups fail after a cyber-attack or other business-critical event. A dispersed and segregated working environment does not mean better security. Data protection should mimic rapidly changing work environments, such as WFH. A comprehensive backup and business continuity plan should cover your WFH as a critical business asset, protect confidential data while ensuring data privacy by using modern intelligent backup solutions with threat protection and self-healing integration.
Integration of artificial intelligence into your business environment is not only prudent; it’s cost-effective and enables your employees to be more productive by allowing them to focus on what matters most – the business, not the security. Leave the security thinking to security experts that build an environment that is affordable, aligns to your business needs, maximizes productivity and return on investment.
Advanced Persistent Threats (APT) are just that…persistent – hackers consistently target key assets to the business, like the C-Suite, especially where executives are most vulnerable, e.g. during times of crisis (COVID-19) and operating from a WFH environment. Protect key staff members and corporate security interests with the latest security plug n’ play devices that offer comprehensive security, scanning, privacy and monitoring in a single package to address constantly evolving threats.
Are you concerned that your business is vulnerable while you are not there? Alleviate those feelings with real-time cybersecurity monitoring. In 24 hours you could have Withum’s Cyber AIR4 Droid™ (“AIR4”) set up to provide monitoring, alerts, auditing, incident response, cyber forensics and reporting all in one dashboard. This device can provide intelligent identification, scanning, probing and mapping of network(s) devices and vulnerabilities automatically.
As we continue to navigate COVID-19 pandemic, cybersecurity and your business, it is important to keep in mind that there are many resources available to help. Withum’s Cybersecurity Team can rapidly deploy IT security and monitoring tools on BYOD and business devices to add additional layers of security to employees working from home. Reporting metrics on employee business productivity while ensuring data loss prevention and data privacy, both for the business as well as the employee is also available.
Get news updates and event information from Withum
Subscribe