Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & Training

Maintaining Privacy and Cybersecurity Vigilance during the Coronavirus Outbreak

By Mindi Giftos
cybersecurity-laptop
March 17, 2020

Part of any good cybersecurity program rests on spreading good habits and inculcating employees with best practices around handling data and using network resources. In this cybersecurity is as much a behavioral challenge as it as a technological one. That’s precisely why the recent coronavirus outbreak, or COVID-19, is so potentially harmful to a company’s cybersecurity efforts.

Already, we have seen a large number of event cancellations and the shuttering of offices around the world as organizations attempt to balance public health concerns with business as usual. Many companies are actively encouraging their employees to work from home if possible. For organizations that do this routinely, coronavirus-related cybersecurity issues will be less of a concern; however, for a great many businesses, working remotely is not the norm, and it will necessarily disrupt work patterns and processes.

Cybersecurity training often teaches employees how to spot threats within their everyday work environments, and as this level of awareness becomes routinized, vigilance depends somewhat on an employee’s ability to identify things that are out of place or unusual, such as an email from an unknown domain or an email request that is out of the ordinary.

When a large number of employees are working remotely—and not used to doing so—suddenly everything in the work environment is a little different. Routines are broken; processes for getting work done might be different than before. Additionally, there is the added likelihood that many employees—in an attempt to be efficient—will use non-secure channels and processes to move data and files. The boundary between secured business networks and unsecured personal networks could become harder to police for IT teams, who will already be hard at work making sure that networks can handle the spike in data moving about the company due to remote workers.

This is an ideal circumstance for cyber criminals looking to exploit vulnerabilities in a company’s data security. Unfortunately, we are likely to see an uptick of criminal activity in light of this “opportunity” for bad actors. Accordingly, it is important to be hyper-vigilant regarding both system security and phishing/social engineering attacks.

To protect against cyber risks during the COVID-19 outbreak, we recommend taking the following steps:

  • Create a plan tailored to your organization to keep business operations running while considering cybersecurity. This plan should include technological requirements, procedural requirements, and communications strategy.
  • Understand that this type of disruption and change presents a key opportunity for malicious actors and employee errors. Keep this challenge in mind with all COVID-19 contingency planning.
  • When shifting to a work-from-home model, if possible, take the following steps prior to rolling out:
    • Ensure all employees have secured network access and have organization owned-devices rather than personal devices to use.
    • Ensure all employees have sufficient Internet connectivity and access at home;
    • Set up security authentication questions (for help desk and others) and multi-factor authentication prior to providing access.
    • Obtain additional software access licenses as needed.
    • Prepare and provide brief but clear tutorial information to employees on how to access systems remotely.
    • Provide education and information prior to roll out to avoid an overloaded help-desk or call center. When the help desk is overwhelmed, it is too easy for errors to occur.
    • Remind employees that company confidentiality policies remain in effect, so no work material should be taken home on thumb drives, saved to personal devices, or disposed of at home. Likewise, company information should not be uploaded to cloud or other software programs that are not part of the company’s network or printed through third-party printing companies or services.
    • Clearly communicate policies that can avoid social engineering and other similar attacks while working from home. For example, wire transfers and sensitive information should not be sent via email; always confirm requests are legitimate and not fraudulent.
    • Test the capacity for remote work on the network and adjust where necessary to avoid outages.
    • Implement a staged roll-out if possible.
    • Identify individuals from each department that can handle tasks in person if needed.
  • Update your Business Continuity Plans and Disaster Recovery Plans. While many organizations have these important policies, it is unlikely they adequately address the challenges and issues that arise with a global pandemic such as COVID-19.
  • Proactively review your insurance coverage in the event of disruptions or malicious activity.

While these steps will not guarantee any remote work plans will be bullet-proof, they will reduce the likelihood of malicious attacks, errors and outages.

KEYWORDS: coronavirus cyber security cybersecurity Emergency Preparedness

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Giftos mindi

Mindi Giftos is a partner with Husch Blackwell LLP. She is a co-leader of the firm’s Internet of Things (IoT) and Data Privacy, Cybersecurity & Breach Response teams and is the office managing partner of the firm’s Madison, Wis. office.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC1119-edu-Feat-slide1_900px

    The FTC-Facebook Settlement: A Major Shift in U.S. Privacy Regulation

    See More
  • coronavirus - traction guest

    Ensuring Workplace Safety for Essential Services during the Coronavirus Outbreak

    See More
  • patrick fiel 5 mins with

    5 Minutes with Patrick Fiel on Security Practices during Coronavirus Outbreak

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing