Cybersecurity lessons from the pandemic

Jerry Ray, Chief Operations Officer at SecureAge Technology, takes a look at the cybersecurity challenges ahead and what we can learn from our COVID-19 experiences
Jerry Ray, Chief Operations Officer at SecureAge Technology, takes a look at the cybersecurity challenges ahead and what we can learn from our COVID-19 experiences

Better times are hopefully ahead in the real world thanks to the success of the Covid-19 vaccine roll-out. But in cyberspace, there are no equivalent vaccine options that offer the same levels of efficacy and protection against sophisticated and constantly mutating viruses raging throughout our digital ecosystems. Google registered over 2 million malicious websites during 2020 and said it was blocking more than 100 million phishing emails a day during the first lockdown, with almost a fifth of them related to coronavirus.

Exploiting the Home-to-Office migration

Covid-19 has posed new cybersecurity challenges and will have a long and lasting impact on the evolving threat landscape. Working from home created a mass of distracted employees outside the confines of their office network and secured perimeter, vulnerable to phishing emails around Covid-19 and vaccine news. But motivated hackers will be just as active as offices and hospitality come back to life. Phishing messages related to everything from company policies to social gatherings will introduce new malicious file attachments and lead countless workers astray to fraudulent websites scooping up personal credentials and payment information. Staffing changes, the rush of new hires and mix of flexible working practices, will only serve to compound the problems for system administrators and security specialists.

Head in the clouds

Cloud technology came into its own over the past 18 months by making working from home a seamless exercise, but every endpoint accessing data from inside or outside the office will remain a target of hackers. Security professionals will have to keep in mind that cloud providers offer freedom of data access and freedom from physical infrastructure, but not necessarily the freedom of security or freedom from exploitation. Even with the notion of zero-trust having been shouted and praised globally in relation to VPN use for accessing corporate data, everything that can be seen on the endpoints needs protection on the endpoints. Renewed attention to securing them, whether inside or outside the confines of the corporate network, will be even more essential in the second half of 2021 given that cloud providers did a good enough job of storing, delivering, and securing massive amounts of data over the past year.

Relentless ransomware

Ransomware is one of the most common threats to any organisation’s data security, and this threat continues to increase and evolve. Ransomware made up a massive 81 per cent of all financially motivated cyberattacks in 2020 with the average cost of a breach costing victims a massive $4.44million, according to research by AtlasVPN. Technical preparation, such as remote backups with sufficient intervals and redundancy, should be no more critical than strategic preparation, where decision trees with probabilities should be drawn to help decide if or when to pay a ransom, even if never paying is the default stance prior to being attacked and all data becoming inaccessible.

No immunity

Nobody will be enjoying any type of immune response to changes made to cybersecurity policies throughout the work-from-home experience. The smallest to the largest companies, with hundreds of dedicated IT security staff, will still see users as their weakest security link and in need of constant education. Most cyberattacks are not targeted and rely on massive numbers of automated hacking attempts across vast IP ranges till someone, somewhere brings a dormant shell to life on the hacker’s terminal. No company whatever size is immune and security strategies and tools should constantly be evaluated and tested to protect workers at home or returning to the office.

Time to focus on the data

Traditionally, we have tried to protect all data with multiple layers of security to prevent access, but it is clear this is not working. So, if we can’t keep the cybercriminals out nor trust the people around us to always do the right thing, we must rethink the traditional ‘castle and moat’ methods of protection and adopt a data-centric approach, where security is built into data itself. 

Full disk encryption will protect data when it is at rest on a hard disk or USB stick, which is great if you lose your laptop but is of absolutely no use in protecting data against unauthorised access or theft from a running system. And though the situation may gradually change, most organisations still deploy endpoints with local storage, where extracted, sensitive data is often stored. Data, therefore, needs to be protected not only at rest but also in transit and in use, on-site or in the cloud. This means that if the cybercriminals do get through, they are faced with encrypted data that is useless to them. In effect, we would be beating the ransomware criminals at their own game – and how satisfying is that?

READ MORE:

As companies continue to navigate the new challenges of cybersecurity as we emerge out of the pandemic, approaching their security strategies with a sense of urgency and fresh perspective will reduce overall risk against to the increasing attacks we will face.

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin!

Follow us on LinkedIn and Twitter

Amber Donovan-Stevens

Amber is a Content Editor at Top Business Tech

How E-commerce Marketers Can Win Black Friday

Sue Azari • 11th November 2024

As new global eCommerce players expand their influence across both European and US markets, traditional brands are navigating a rapidly shifting landscape. These fast-growing Asian platforms have gained traction by offering ultra-low prices, rapid product turnarounds, heavy investment in paid user acquisition, and leveraging viral social media trends to create demand almost in real-time. This...

Why microgrids are big news

Craig Tropea • 31st October 2024

As the world continues its march towards a greener future, businesses, communities, and individuals alike are all increasingly turning towards renewable energy sources to power their operations. What is most interesting, though, is how many of them are taking the pro-active position of researching, selecting, and implementing their preferred solutions without the assistance of traditional...

Is automation the silver bullet for customer retention?

Carter Busse • 22nd October 2024

CX innovation has accelerated rapidly since 2020, as business and consumer expectations evolved dramatically during the Covid-19 pandemic. Now, finding the best way to engage and respond to customers has become a top business priority and a key business challenge. Not only do customers expect the highest standard, but companies are prioritising superb CX to...

Automated Testing Tools and Their Impact on Software Quality

Natalia Yanchii • 09th October 2024

Test automation refers to using specialized software tools and frameworks to automate the execution of test cases, thereby reducing the time and effort required for manual testing. This approach ensures that automation tests run quickly and consistently, allowing development teams to identify and resolve defects more effectively. Test automation provides greater accuracy by eliminating human...

Custom Software Development

Natalia Yanchii • 04th October 2024

There is a wide performance gap between industry-leading companies and other market players. What helps these top businesses outperform their competitors? McKinsey & Company researchers are confident that these are digital technologies and custom software solutions. Nearly 70% of the top performers develop their proprietary products to differentiate themselves from competitors and drive growth. As...

The Impact of Test Automation on Software Quality

Natalia Yanchii • 04th October 2024

Software systems have become highly complex now, with multiple interconnected components, diverse user interfaces, and business logic. To ensure quality, QA engineers thoroughly test these systems through either automated or manual testing. At Testlum, we met many software development teams who were pressured to deliver new features and updates at a faster pace. The manual...