Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

COVID-19 has enlarged the digital footprint for American businesses: We’ve never been more at risk for cybercrime

By Tom Kelly
cybersecurity
December 16, 2020

The coronavirus pandemic has sparked a new round of digital transformation. But in many cases, the rapid pace of digital acceleration has enlarged the digital footprint of both businesses and consumers beyond the capacity of our cybersecurity infrastructure to keep up. The scary reality is that the business impact of COVID-19 may be creating the perfect storm for a cybercrime pandemic; digital citizens will have to act aggressively to secure their data before it’s too late.

Traditional cybersecurity had the relative luxury of working to secure a relatively limited digital footprint for most businesses and individuals. Outside of a core system network, the VPN used by on-site personnel and a personal desktop, most companies and individuals didn’t have too much to worry about.

But in our increasingly interconnected and always-online world, digital footprints have a natural tendency to expand. Every online account ID for every digital service, as well as every transaction, communication and internet connection we and our devices make, increases our risk of exposure. Every mark left on the web and every piece of data is a possible point of leverage or access for cybercriminals.

As the coronavirus pandemic has accelerated the widespread adoption of online portals, digital apps, remote work and the Internet of Things, we now have to worry about a digital footprint with a far wider and often much more diffuse perimeter. It’s a paradigm shift in what cybersecurity means. And most of the digital services the industry relies on are not ready for the change.

You can start to see the scale of COVID’s effect on cybersecurity when you look at how fast digital businesses have grown during the pandemic. Online banking services, for example, saw a 200% increase in new registrations in April alone, while sales for “buy online, pick-up in store” services, almost all of which require online accounts or digital app registrations from customers, have skyrocketed by 259% over last year. All told, the pandemic has accelerated existing trends in digital business and e-commerce by about five years. That’s five years of growth in less than one year’s time.

But the big problem here is that this sudden surge in digital business overburdens an already strained cybersecurity infrastructure. Even before the pandemic’s spike in digital activity, many businesses still didn’t have adequate cybersecurity protections in place to protect customer data and information. A Thales Data Threat Report from 2019, for example, found that 36% of U.S. retailers had experienced a data breach in the last year.  

COVID’s digital transformation, by enlarging the digital footprint and increasing risk exposure surfaces for businesses, has only made things worse. In a recent study by the Ponemon Institute, 82% of IT and C-suite respondents reported at least one cybersecurity breach resulting from digital transformation efforts made within the last year. Worse still, over half of respondents said their organization currently lacks the capacity to fully measure the cyber hygiene of their enlarged digital footprint. So, it’s no wonder that when the World Economic Forum asked 350 of the world’s top risk experts to outline the most concerning risks for a post-COVID-19 world, 50% said they were worried about an increase in cybercrime.

The fact is that identity fraud, data breaches and hacks are not a question of “if” in today’s digital environment, but only a question of “when.” Cybercriminals can and will exploit our vulnerabilities and lack of preparation in the months to come. And in many cases, they already have: 71 percent of IT professionals globally report an increased incidence of cybercrime since the pandemic began.

But as frightening as the cybersecurity situation is, we have no reason to be pessimistic about the future. It’s never too late for companies and consumers to upgrade and enhance their cybersecurity protections, and anyone concerned about their cybersecurity can still easily acquire the tools and resources they need to protect themselves.

In part, preparing a more secure digital future will require a change of mindset. Many people still think of cybersecurity as a big-ticket issue reserved for digital experts and IT specialists. But in our age of remote work, personal smart devices and online consumption, it’s the individual who needs to manage their risk exposure and protect their privacy; no one can afford to rely on the cybersecurity infrastructure of the digital services they use.

But you can’t protect yourself against unknown risks, and most people don’t even know where to begin assessing their digital exposure and quantifying their digital footprint. That’s a big reason why, at IDX, we’ve launched IDX Privacy as a platform specifically geared to enable ordinary individuals to get a quick and streamlined overview of their digital privacy and security. In addition to giving users access to a toolbox of technologies, from dark web scanners and tracking blockers to password protection assistance, IDX Privacy analyzes a user’s digital footprint and provides both a privacy score and personalized security guidelines. It’s one way users can get a handle on the risk exposure.

Digital innovation is often superb for the company bottom line, and no one will argue with the added convenience and ease of digital technology. But the rapid digital acceleration we’re experiencing during the pandemic comes with significant cybersecurity costs. People need to know the risks, and start to plan and act accordingly.

KEYWORDS: COVID-19 cyber security risk management

Share This Story

Tom kelly headshot 1

Tom Kelly is president and CEO of IDX. He is a Silicon Valley serial entrepreneur having led both public and private technology companies through all stages of growth. He has led companies through IPOs as well as other successful exits via acquisition. With decades of experience as CEO in enterprise software companies, Tom most recently was CEO at security software company AccelOps and Moxie Software. Tom has a BS from Santa Clara University and operates out of Portland and Silicon Valley. 

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing