Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity & Business Resilience

Rethinking cybersecurity in the age of COVID: The "Dos and Don'ts" of protection

By Ian Pratt
rethinking cybersecurity defenses in the age of COVID-19
April 22, 2021

Today’s threat actors are constantly on the move. And COVID-19 has created even more opportunities for them, as emergency digital investments broaden the corporate attack surface. The FBI recorded a 300% increase in reported cybercrimes in the first month of the pandemic. It’s perhaps no surprise that over two-thirds (68%) of business leaders feel security risk is increasing.

Thriving darknet marketplaces offer a continually evolving source of readymade attack tools and knowledge to financially motivated cyber-criminals. Theirs is a highly professional, commoditized industry worth over $600 billion. On the other side, mass remote working has exposed distracted employees, unsecured endpoints and home networks to a surge in threats. Security skills shortages only add to the challenges facing CISOs.

Organizations must move quickly to identify and prevent attacks as early as possible in the kill-chain. But the old endpoint security paradigm is no longer fit-for-purpose. It’s vital that we reinvent our approach to security to stay one step ahead of those who seek to cause us harm. The first step on this journey is understanding the Dos and Don’ts of cybersecurity.

DON’T rely on detection alone:

In October, HP identified a large-scale TrickBot campaign using Microsoft’s “Encrypt with Password” feature. This helped malicious documents slip past network security and behavioral detection tools, as the malware was only deployed if users entered the password sent in the phishing email. What can we learn from this? That detection-based tools can often be evaded by resourceful cyber-criminals. They don’t even have to use zero-day exploits or polymorphic malware.

Detection-based security tools also suffer from frequent false negatives and false positives. In fact, research shows that some security operations center (SOC) teams are receiving over 10,000 alerts per day, which they must trawl through to find serious threats. This can result in alert fatigue, and ultimately, attacks being missed. Once hackers have bypassed these defenses, they can move laterally to targeted systems with additional payloads dropped to steal data, mine for cryptocurrency, deploy ransomware and more.

DON’T make users the last line of defense:

The main target of attacks is often the endpoint, or the user in charge of it. Security tools are meant to protect users — by blocking malware before it reaches them, or detecting malicious content when a user clicks on it. However, as mentioned, real-time detection is far from 100% effective.

The result: users are still too often the last line of defense. The past year has seen a 176% increase in malicious Microsoft Office files, and COVID-19 has been a much-used and effective phishing lure to trick employees. User education can only work up to a point. Humans will always make mistakes and, when they do, the entire organization may be put at risk.

DO build security from the ground up:

It’s time to reinvent how we approach security, by building it into systems from the chip up. That means shifting to a protection-first model — one that doesn’t rely on detection but instead uses sound security engineering practices such as fine-grained isolation, the principle of least privilege (PoLP), and mandatory access control.

Protection-first also means micro-virtualization, where risky actions – such as opening web links, downloads and attachments – are performed within hardware enforced micro-VMs, isolated from the rest of the device or network. This way, it doesn’t matter if a document or web page is riddled with malware, because the hacker has nowhere to go, nothing to steal and no way to persist. Users can go back to their day job and click away with confidence. 

By isolating key attack vectors like browsers, email and downloads, organizations can dramatically reduce their attack surface. The most common avenues to compromised endpoints become dead-ends. When threats are executed within micro-VMs, the full attack kill-chain can also be captured into a detailed “flight recorder.” This provides the SOC team with rich, high fidelity threat intelligence and indicators of compromise (IOCs) that can be used to help defend other systems.

DO rethink your approach to security:

Incremental innovation in security is failing to disrupt committed threat actors. We need to stop placing the burden of security on end users with a new, hardware-powered approach that isolates threats, ensuring they cannot infect PCs or spread through corporate networks. This is just the start. It marks the beginning of a virtualization-powered revolution in security, which promises to maximize user productivity and minimize cyber risk.

KEYWORDS: cyber security cyber security threats cybersecurity defense cybersecurity preparedness

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ian Pratt is Global Head of Security for Personal Systems, HP Inc.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Boardroom

    The dos and don'ts of advocating for cybersecurity in the boardroom

    See More
  • Glowing red and green connections

    Rethinking network and security monitoring in the age of TLS 1.3

    See More
  • The young endangered: Is cyber radicalization intensifying in the age of COVID?

    See More

Related Products

See More Products
  • The Database Hacker's Handboo

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • Physical Security and Environmental Protection

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing