Sign In
The CEO Views Small logos
  • Home
  • Technology
    Artificial Intelligence
    Big Data
    Block Chain
    BYOD
    Cloud
    Cyber Security
    Data Center
    Digital Transformation
    Enterprise Mobility
    Enterprise Software
    IOT
    IT Services
    Innovation
  • Platforms
    How IBM Maximo Is Revolutionizing Asset Management
    How IBM Maximo Is Revolutionizing Asset Management
    IBM
    7 Min Read
    Optimizing Resources: Oracle DBA Support Services for Efficient Database Management
    Oracle
    Oracle
    9 Min Read
    The New Google Algorithm Update for 2021
    google algorithm update 2021
    Google
    5 Min Read
    Oracle Cloud Platform Now Validated for India Stack
    Service Partner Horizontal
    Oracle
    3 Min Read
    Oracle and AT&T Enter into Strategic Agreement
    oracle
    Oracle
    3 Min Read
    Check out more:
    • Google
    • HP
    • IBM
    • Oracle
  • Industry
    Banking & Insurance
    Biotech
    Construction
    Education
    Financial Services
    Healthcare
    Manufacturing
    Mining
    Public Sector
    Retail
    Telecom
    Utilities
    Gaming
    Legal
  • Functions
    RISMA Systems: A Comprehensive Approach to Governance, Risk and Compliance
    Risma Systems
    ENTREPRENEUR VIEWSGDPR
    9 Min Read
    Happiest Minds: A “Privacy by Design” approach is key to creating GDPR compliant businesses
    Happiest Minds 1
    GDPR
    8 Min Read
    Gemserv: GDPR 2020 and Beyond
    Gemserv 1
    GDPR
    9 Min Read
    ECCENCA:GDPR IS STILL AN UNTAMED ANIMAL
    eccenca 1
    GDPR
    6 Min Read
    Boldon James: HOW ENTERPRISES CAN MITIGATE THE GROWING THREATS OF DATA
    Boldon James 1
    GDPR
    8 Min Read
    Check out more:
    • GDPR
  • Magazines
  • Entrepreneurs Views
  • Editor’s Bucket
  • Press Release
  • Micro Blog
  • Events
Reading: Cyber Security After COVID-19
Share
The CEO Views
Aa
  • Home
  • Magazines
  • Enterpreneurs Views
  • Editor’s Bucket
  • Press Release
  • Micro Blog
Search
  • World’s Best Magazines
  • Technology
    • Artificial Intelligence
    • Big Data
    • Block Chain
    • BYOD
    • Cloud
    • Cyber Security
    • Data Center
    • Digital Transformation
    • Enterprise Mobility
    • Enterprise Software
    • IOT
    • IT Services
  • Platforms
    • Google
    • HP
    • IBM
    • Oracle
  • Industry
    • Banking & Insurance
    • Biotech
    • Construction
    • Education
    • Financial Services
    • Healthcare
    • Manufacturing
    • Mining
    • Public Sector
    • Retail
    • Telecom
    • Utilities
  • Functions
    • GDPR
  • Magazines
  • Editor’s Bucket
  • Press Release
  • Micro Blog
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
The CEO Views > Blog > Technology > Cyber Security > Cyber Security After COVID-19
Cyber Security

Cyber Security After COVID-19

The CEO Views
Last updated: 2024/03/11 at 12:34 AM
The CEO Views
Share
engin akyurt KtYvqysesC4 unsplash scaled 1
engin akyurt KtYvqysesC4 unsplash scaled 1

As governments begin to lift emergency orders, business leaders consider policies, technology and processes to protect their workforce. Many of these factors rightly focus on health and safety, but we also have to recognize that we are all still targets for cyberattacks. The new world of work-from-home has poked countless holes in security perimeters, so organizations also have to prioritize Cyber security After COVID-19 preparation.

Going Back to Work Securely

According to a recent (ISC)2 study, 23% of cyber security leaders said their organization had experienced an increase in cyberattacks since COVID-19 caused employees to start working from home. Although 50% said they believed they practiced best practices, they also said they should do more to secure their remote workforce. This situation has demonstrated that during a crisis, the bad guys don’t go on holiday.

What had changed during that time in the environment? And, what modifications have not been made to protect it best? This is the gap paid to CISOs by filling as businesses consider returning to work-as-normal. It is uncertain when many places around the world will reopen. As some states and counties express their plan to open up (or have already started to do so), the time is now for security leaders to take the measures required to ensure the transition is safe.

Here are a few key factors:

  • Vulnerability Check: Laptops and other devices are enormous assets that allowed employees to continue their work remotely. But when out of service, those who do not connect to the corporate network through a VPN may not have received the requisite updates to OS, Web, AV and GPO that they would usually receive. It puts organizations at risk as these systems reconnect with corporate networks. When returning to the network, it might not be necessary to search for all devices. Still, security leaders will consider doing so where they can-as well as planning processes to verify accessories returning to the corporate network.
  • Devices of Quarantine Returning to Business Network: Following a zero trust model, security leaders will ensure that any potential risks that may have arisen because of remote work are accounted for. Only allow access to devices if they have been validated as secure. While quarantining devices by default may initially introduce some user experience and complexity challenges, risk minimization is an essential step in this type of scenario.
  • Educate Employees: Given the rapid nature of the transition, there was little time to educate staff on appropriate remote work practices. While returning to the workplace, the benefit of security leaders is that there is plenty of time to be vigilant when educating staff on best practices, as well as risks such as targeted phishing attacks that may try to take advantage of the move.
  • Get Ready for those who can’t Get Back to the Office: While in the coming weeks or months, some employees may be heading to work, which may not be possible for every employee. Some employees may have underlying health concerns that place them at higher risk, making it safer for them to stay at home, or maybe they have kids at home that need care.
  • Consider Upgrading Approaches for Cybersecurity: Finally, during this time, there is a unique opportunity to reconsider long term cyber security strategies. This could include using quiet networks to base network activity to understand abnormal movement better, or rethinking security policies and remote work procedures. In any case, the leaders should take some time to step back and think about what this crisis has taught them about their organizations and any exposed security weaknesses. That information can inform strategies in the coming months and years.
The CEO Views July 9, 2020
Share this Article
Facebook Twitter LinkedIn Email Copy Link
Previous Article jeshoots com 2vD8lIhdnw unsplash scaled 1 Computer Vision in Education Sector
Next Article avatar 2191918 1920 e1594300046526 HR Directors focusing on AI and Machine Learning
Website photo design 1

GDPR Auto: GDPR’s Next Paradigm Shift

February 28, 2024
Gregg M. Hollander
Legal

A Look at South Florida’s Top Personal Injury Law Firm, Hollander Law Firm Accident Injury Lawyers

The CEO Views By The CEO Views May 30, 2025
2 3
Micro Blog

Virtual rooms and prospects for the development of the sector

The CEO Views By The CEO Views February 9, 2024
RNN Group
Magazine

RNN Group: Disrupting Debt Collection

The CEO Views By The CEO Views February 27, 2020
The Changing Landscape of Manufacturing Supply Chain Globalization and Regulatory Compliance
Manufacturing

The Changing Landscape of Manufacturing: Supply Chain, Globalization, and Regulatory Compliance

The CEO Views By The CEO Views October 15, 2024

Australia’s Crypto Gamble: From Pubs to Blockchain – Leading the Future of Betting

September 24, 2025

The Economic Impact of Instant Online Casino Payouts on Player Behavior: Insights & Trends

September 24, 2025

Economical Solutions for Storage and Transportation

September 24, 2025

8 Real-World Use Cases of Blurring Faces in Videos

September 24, 2025

You Might Also Like

Cybersecurity Threats from Unexpected Sources What Businesses Need to Know
Cyber Security

Cybersecurity Threats from Unexpected Sources: What Businesses Need to Know

9 Min Read
Why Do Websites Keep Asking Your Age 1
Cyber Security

Why Do Websites Keep Asking Your Age? The Truth Behind Verification

13 Min Read
Always Stable
Cyber Security

Always Stable: The Secret to Managing Intense Web Workloads Smoothly

8 Min Read
What’s the ROI of Penetration Testing for Growing Companies
Cyber Security

What’s the ROI of Penetration Testing for Growing Companies?

4 Min Read
Small logos Small logos

© 2025 All rights reserved. The CEO Views

  • About Us
  • Privacy Policy
  • Advertise with us
  • Reprints and Permissions
  • Business Magazines
  • Contact
Reading: Cyber Security After COVID-19
Share

Removed from reading list

Undo
Welcome Back!

Sign in to your account

Lost your password?