Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & Training

Maintaining Privacy and Cybersecurity Vigilance during the Coronavirus Outbreak

By Mindi Giftos
cybersecurity-laptop
March 17, 2020

Part of any good cybersecurity program rests on spreading good habits and inculcating employees with best practices around handling data and using network resources. In this cybersecurity is as much a behavioral challenge as it as a technological one. That’s precisely why the recent coronavirus outbreak, or COVID-19, is so potentially harmful to a company’s cybersecurity efforts.

Already, we have seen a large number of event cancellations and the shuttering of offices around the world as organizations attempt to balance public health concerns with business as usual. Many companies are actively encouraging their employees to work from home if possible. For organizations that do this routinely, coronavirus-related cybersecurity issues will be less of a concern; however, for a great many businesses, working remotely is not the norm, and it will necessarily disrupt work patterns and processes.

Cybersecurity training often teaches employees how to spot threats within their everyday work environments, and as this level of awareness becomes routinized, vigilance depends somewhat on an employee’s ability to identify things that are out of place or unusual, such as an email from an unknown domain or an email request that is out of the ordinary.

When a large number of employees are working remotely—and not used to doing so—suddenly everything in the work environment is a little different. Routines are broken; processes for getting work done might be different than before. Additionally, there is the added likelihood that many employees—in an attempt to be efficient—will use non-secure channels and processes to move data and files. The boundary between secured business networks and unsecured personal networks could become harder to police for IT teams, who will already be hard at work making sure that networks can handle the spike in data moving about the company due to remote workers.

This is an ideal circumstance for cyber criminals looking to exploit vulnerabilities in a company’s data security. Unfortunately, we are likely to see an uptick of criminal activity in light of this “opportunity” for bad actors. Accordingly, it is important to be hyper-vigilant regarding both system security and phishing/social engineering attacks.

To protect against cyber risks during the COVID-19 outbreak, we recommend taking the following steps:

  • Create a plan tailored to your organization to keep business operations running while considering cybersecurity. This plan should include technological requirements, procedural requirements, and communications strategy.
  • Understand that this type of disruption and change presents a key opportunity for malicious actors and employee errors. Keep this challenge in mind with all COVID-19 contingency planning.
  • When shifting to a work-from-home model, if possible, take the following steps prior to rolling out:
    • Ensure all employees have secured network access and have organization owned-devices rather than personal devices to use.
    • Ensure all employees have sufficient Internet connectivity and access at home;
    • Set up security authentication questions (for help desk and others) and multi-factor authentication prior to providing access.
    • Obtain additional software access licenses as needed.
    • Prepare and provide brief but clear tutorial information to employees on how to access systems remotely.
    • Provide education and information prior to roll out to avoid an overloaded help-desk or call center. When the help desk is overwhelmed, it is too easy for errors to occur.
    • Remind employees that company confidentiality policies remain in effect, so no work material should be taken home on thumb drives, saved to personal devices, or disposed of at home. Likewise, company information should not be uploaded to cloud or other software programs that are not part of the company’s network or printed through third-party printing companies or services.
    • Clearly communicate policies that can avoid social engineering and other similar attacks while working from home. For example, wire transfers and sensitive information should not be sent via email; always confirm requests are legitimate and not fraudulent.
    • Test the capacity for remote work on the network and adjust where necessary to avoid outages.
    • Implement a staged roll-out if possible.
    • Identify individuals from each department that can handle tasks in person if needed.
  • Update your Business Continuity Plans and Disaster Recovery Plans. While many organizations have these important policies, it is unlikely they adequately address the challenges and issues that arise with a global pandemic such as COVID-19.
  • Proactively review your insurance coverage in the event of disruptions or malicious activity.

While these steps will not guarantee any remote work plans will be bullet-proof, they will reduce the likelihood of malicious attacks, errors and outages.

KEYWORDS: coronavirus cyber security cybersecurity Emergency Preparedness

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Giftos mindi

Mindi Giftos is a partner with Husch Blackwell LLP. She is a co-leader of the firm’s Internet of Things (IoT) and Data Privacy, Cybersecurity & Breach Response teams and is the office managing partner of the firm’s Madison, Wis. office.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC1119-edu-Feat-slide1_900px

    The FTC-Facebook Settlement: A Major Shift in U.S. Privacy Regulation

    See More
  • coronavirus - traction guest

    Ensuring Workplace Safety for Essential Services during the Coronavirus Outbreak

    See More
  • patrick fiel 5 mins with

    5 Minutes with Patrick Fiel on Security Practices during Coronavirus Outbreak

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • 9780367667887.jpg

    Surveillance, Privacy and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing