Sign In
The CEO Views Small logos
  • Home
  • Technology
    Artificial Intelligence
    Big Data
    Block Chain
    BYOD
    Cloud
    Cyber Security
    Data Center
    Digital Transformation
    Enterprise Mobility
    Enterprise Software
    IOT
    IT Services
    Innovation
  • Platforms
    How IBM Maximo Is Revolutionizing Asset Management
    How IBM Maximo Is Revolutionizing Asset Management
    IBM
    7 Min Read
    Optimizing Resources: Oracle DBA Support Services for Efficient Database Management
    Oracle
    Oracle
    9 Min Read
    The New Google Algorithm Update for 2021
    google algorithm update 2021
    Google
    5 Min Read
    Oracle Cloud Platform Now Validated for India Stack
    Service Partner Horizontal
    Oracle
    3 Min Read
    Oracle and AT&T Enter into Strategic Agreement
    oracle
    Oracle
    3 Min Read
    Check out more:
    • Google
    • HP
    • IBM
    • Oracle
  • Industry
    Banking & Insurance
    Biotech
    Construction
    Education
    Financial Services
    Healthcare
    Manufacturing
    Mining
    Public Sector
    Retail
    Telecom
    Utilities
    Gaming
    Legal
  • Functions
    RISMA Systems: A Comprehensive Approach to Governance, Risk and Compliance
    Risma Systems
    ENTREPRENEUR VIEWSGDPR
    9 Min Read
    Happiest Minds: A “Privacy by Design” approach is key to creating GDPR compliant businesses
    Happiest Minds 1
    GDPR
    8 Min Read
    Gemserv: GDPR 2020 and Beyond
    Gemserv 1
    GDPR
    9 Min Read
    ECCENCA:GDPR IS STILL AN UNTAMED ANIMAL
    eccenca 1
    GDPR
    6 Min Read
    Boldon James: HOW ENTERPRISES CAN MITIGATE THE GROWING THREATS OF DATA
    Boldon James 1
    GDPR
    8 Min Read
    Check out more:
    • GDPR
  • Magazines
  • Entrepreneurs Views
  • Editor’s Bucket
  • Press Release
  • Micro Blog
  • Events
Reading: Cyber Security After COVID-19
Share
The CEO Views
Aa
  • Home
  • Magazines
  • Enterpreneurs Views
  • Editor’s Bucket
  • Press Release
  • Micro Blog
Search
  • World’s Best Magazines
  • Technology
    • Artificial Intelligence
    • Big Data
    • Block Chain
    • BYOD
    • Cloud
    • Cyber Security
    • Data Center
    • Digital Transformation
    • Enterprise Mobility
    • Enterprise Software
    • IOT
    • IT Services
  • Platforms
    • Google
    • HP
    • IBM
    • Oracle
  • Industry
    • Banking & Insurance
    • Biotech
    • Construction
    • Education
    • Financial Services
    • Healthcare
    • Manufacturing
    • Mining
    • Public Sector
    • Retail
    • Telecom
    • Utilities
  • Functions
    • GDPR
  • Magazines
  • Editor’s Bucket
  • Press Release
  • Micro Blog
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
The CEO Views > Blog > Technology > Cyber Security > Cyber Security After COVID-19
Cyber Security

Cyber Security After COVID-19

The CEO Views
Last updated: 2024/03/11 at 12:34 AM
The CEO Views
Share
engin akyurt KtYvqysesC4 unsplash scaled 1
engin akyurt KtYvqysesC4 unsplash scaled 1

As governments begin to lift emergency orders, business leaders consider policies, technology and processes to protect their workforce. Many of these factors rightly focus on health and safety, but we also have to recognize that we are all still targets for cyberattacks. The new world of work-from-home has poked countless holes in security perimeters, so organizations also have to prioritize Cyber security After COVID-19 preparation.

Going Back to Work Securely

According to a recent (ISC)2 study, 23% of cyber security leaders said their organization had experienced an increase in cyberattacks since COVID-19 caused employees to start working from home. Although 50% said they believed they practiced best practices, they also said they should do more to secure their remote workforce. This situation has demonstrated that during a crisis, the bad guys don’t go on holiday.

What had changed during that time in the environment? And, what modifications have not been made to protect it best? This is the gap paid to CISOs by filling as businesses consider returning to work-as-normal. It is uncertain when many places around the world will reopen. As some states and counties express their plan to open up (or have already started to do so), the time is now for security leaders to take the measures required to ensure the transition is safe.

Here are a few key factors:

  • Vulnerability Check: Laptops and other devices are enormous assets that allowed employees to continue their work remotely. But when out of service, those who do not connect to the corporate network through a VPN may not have received the requisite updates to OS, Web, AV and GPO that they would usually receive. It puts organizations at risk as these systems reconnect with corporate networks. When returning to the network, it might not be necessary to search for all devices. Still, security leaders will consider doing so where they can-as well as planning processes to verify accessories returning to the corporate network.
  • Devices of Quarantine Returning to Business Network: Following a zero trust model, security leaders will ensure that any potential risks that may have arisen because of remote work are accounted for. Only allow access to devices if they have been validated as secure. While quarantining devices by default may initially introduce some user experience and complexity challenges, risk minimization is an essential step in this type of scenario.
  • Educate Employees: Given the rapid nature of the transition, there was little time to educate staff on appropriate remote work practices. While returning to the workplace, the benefit of security leaders is that there is plenty of time to be vigilant when educating staff on best practices, as well as risks such as targeted phishing attacks that may try to take advantage of the move.
  • Get Ready for those who can’t Get Back to the Office: While in the coming weeks or months, some employees may be heading to work, which may not be possible for every employee. Some employees may have underlying health concerns that place them at higher risk, making it safer for them to stay at home, or maybe they have kids at home that need care.
  • Consider Upgrading Approaches for Cybersecurity: Finally, during this time, there is a unique opportunity to reconsider long term cyber security strategies. This could include using quiet networks to base network activity to understand abnormal movement better, or rethinking security policies and remote work procedures. In any case, the leaders should take some time to step back and think about what this crisis has taught them about their organizations and any exposed security weaknesses. That information can inform strategies in the coming months and years.
The CEO Views July 9, 2020
Share this Article
Facebook Twitter LinkedIn Email Copy Link
Previous Article jeshoots com 2vD8lIhdnw unsplash scaled 1 Computer Vision in Education Sector
Next Article avatar 2191918 1920 e1594300046526 HR Directors focusing on AI and Machine Learning
Is Bluevine Business Checking Right for Your Small Business

Is Bluevine Business Checking Right for Your Small Business?

November 7, 2024
F.H.Cann Associates
ENTREPRENEUR VIEWS

F.H.Cann Associates: Streamlining Revenue Recovery Efforts

The CEO Views By The CEO Views February 26, 2024
Business model innovation
Editor's Bucket

The Role of Business Model Innovation in Driving Sustainable Business Growth

The CEO Views By The CEO Views March 18, 2025
Law Offices of John Leon
ENTREPRENEUR VIEWS

The Law Offices of John Leon: Pioneers in Crisis Management

The CEO Views By The CEO Views February 22, 2024
5 Overlooked Stress Management Techniques for CEOs
Micro Blog

5 Overlooked Stress Management Techniques for CEOs

The CEO Views By The CEO Views June 6, 2025

The US Stock Market Today Takes a Surprising Turn as Stocks are Rising and Oil is Tumbling after Iran Launched Missiles at US Bases

June 25, 2025

Redefining Business Success: An Exclusive Interview with Joy Gendusa, CEO of PostcardMania

June 25, 2025

St. Cloud Financial Credit Union: Trailblazing Financial Technology

June 25, 2025

Res Media: Crafting More than Just Applications

June 25, 2025

You Might Also Like

Are Proxy Servers Safe to Use
Cyber Security

Are Proxy Servers Safe to Use? Comparing with VPN Alternatives

7 Min Read
How Cyber Security Measures are Evolving in Online Gaming
Cyber Security

How Cyber Security Measures are Evolving in Online Gaming

4 Min Read
How to Get Proxy Address for WhatsApp
Cyber Security

How to Get Proxy Address for WhatsApp: Simple Guide for Secure & Fast Setup

7 Min Read
The Role of Cybersecurity in Online Sports Betting
Cyber Security

The Role of Cybersecurity in Online Sports Betting

7 Min Read
Small logos Small logos

© 2025 All rights reserved. The CEO Views

  • About Us
  • Privacy Policy
  • Advertise with us
  • Reprints and Permissions
  • Business Magazines
  • Contact
Reading: Cyber Security After COVID-19
Share

Removed from reading list

Undo
Welcome Back!

Sign in to your account

Lost your password?