{"id":40903,"date":"2020-05-19T19:11:14","date_gmt":"2020-05-19T15:11:14","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=40903"},"modified":"2025-11-21T17:22:19","modified_gmt":"2025-11-21T13:22:19","slug":"covid-19-and-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/covid-19-and-cybersecurity\/","title":{"rendered":"COVID-19 and Cybersecurity: Main Threats and Protective Measures"},"content":{"rendered":"<p>There\u2019s an ancient Chinese curse that goes something like this: may you live in interesting times. To be perfectly honest, I\u2019m hoping that these \u201cinteresting\u201d times return to normal sometime soon.<!--more--><\/p>\n<p>For cybersecurity departments the world over, the fallout from the COVID-19 pandemic has made this time in history interesting, unlike anything current generations have ever experienced. It was <a href=\"https:\/\/thehill.com\/policy\/cybersecurity\/493198-fbi-sees-spike-in-cyber-crime-reports-during-coronavirus-pandemic\" target=\"_blank\" rel=\"noopener noreferrer\">just reported<\/a> that the FBI is receiving between 3,000 and 4,000 cybersecurity complaints a day, a big jump from the 1,000 pre-coronavirus daily average.<\/p>\n<p>For chief information security officers (CISOs), the challenge has been twofold. How to keep business operations up and running, while at the same time trying to prevent and mitigate ramped-up security threats.<\/p>\n<p>Why more hacker activity in the midst of the pandemic? It\u2019s simple. The sudden increase in those working from home, combined with stay-at-home orders from the government, has created a restless, confined population that spends way more time online than it used to.<\/p>\n<p>It\u2019s a simple matter of opportunity.<\/p>\n<p>While some businesses have been crushed by the new challenges, others have managed to thrive. Let\u2019s take a look at the latter and break down how they\u2019ve done it.<\/p>\n<h2>Threat Vulnerabilities Are On the Rise - Fast<\/h2>\n<p>With non-essential travel almost at a standstill and public gatherings eliminated all but entirely, society has gone digital en masse. Workers and students alike find themselves spending more time in front of the computer than ever before, doing their best to maintain some semblance of normalcy in a world gone haywire, through a host of online collaboration tools.<\/p>\n<p>And when we\u2019re done working or studying, we stay online to play, shop, read, stream, and chat. The resulting stress placed on cybersecurity systems has applied a multiplying effect to threat vectors:<\/p>\n<h3>Problem #1 - Working from Home<\/h3>\n<p>While remote work has been on the rise for more than a decade, COVID-inspired rules kicked it into high gear like nothing we\u2019ve seen before. Overnight, companies were forbidden to let employees come into the office, which left a workforce suddenly relocated with little training in how to secure the company data they would be working with or protect their own personal information from theft.<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/how-msps-can-minimize-covid-19-disruption-for-businesses\/\">How MSPs Can Minimize COVID-19 Disruption for Businesses<\/a><\/p>\n<p id=\"last\">Having the knowledge to install or access a <a href=\"https:\/\/www.msp360.com\/resources\/blog\/vpn-data-leaks-protection\/\">virtual private network (VPN)<\/a> and <a href=\"https:\/\/www.msp360.com\/resources\/blog\/password-management\/\">create strong passwords<\/a> for every software, app, or network accessed takes or to <a href=\"https:\/\/www.msp360.com\/resources\/blog\/introduction-to-bitlocker-for-msps\/\">encrypt the users' drives<\/a> on more critical importance than ever. The problem is that CISOs everywhere are finding out whether the team paid attention to all that harping on security protocols.<\/p>\n<div id=\"slidebox\"><a class=\"close\">\u00a0<\/a><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-bcfa34a1-273d-49a3-b24f-0878ce601a54\" data-portal=\"5442029\" data-id=\"bcfa34a1-273d-49a3-b24f-0878ce601a54\"><span class=\"hs-cta-node hs-cta-bcfa34a1-273d-49a3-b24f-0878ce601a54\" id=\"hs-cta-bcfa34a1-273d-49a3-b24f-0878ce601a54\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/bcfa34a1-273d-49a3-b24f-0878ce601a54\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-bcfa34a1-273d-49a3-b24f-0878ce601a54\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/bcfa34a1-273d-49a3-b24f-0878ce601a54.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/div>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\" style=\"width: 30%;\"><img decoding=\"async\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/05\/wp_pic_preview.png\" alt=\"WP icon\" \/><\/div>\n<div class=\"call-to-action__right\" style=\"width: 70%;\">\n<div class=\"call-to-action__title\">Work-From-Home Security Essentials<\/div>\n<div class=\"call-to-action__text\">Learn what you can do to enhance your cybersecurity measures and protect remote teams.<\/div>\n<div class=\"call-to-action__text\">\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-c3cc0ee2-7384-4564-bf4b-406af3fdbdd9\" data-portal=\"5442029\" data-id=\"c3cc0ee2-7384-4564-bf4b-406af3fdbdd9\"><span class=\"hs-cta-node hs-cta-c3cc0ee2-7384-4564-bf4b-406af3fdbdd9\" id=\"hs-cta-c3cc0ee2-7384-4564-bf4b-406af3fdbdd9\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/c3cc0ee2-7384-4564-bf4b-406af3fdbdd9\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-c3cc0ee2-7384-4564-bf4b-406af3fdbdd9\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/c3cc0ee2-7384-4564-bf4b-406af3fdbdd9.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n<\/div>\n<\/div>\n<h3>Problem #2 - Hackers Are Bored Too<\/h3>\n<p>Fine, upstanding citizens aren\u2019t the only people confined to quarters. Hackers have to stay indoors as well, leaving them with <a href=\"https:\/\/incrediblethings.com\/reviews\/five-prolific-hackers-history\/\" target=\"_blank\" rel=\"noopener noreferrer\">more time to perfect their schemes<\/a>, and more time for their victims to let their guard down.<\/p>\n<p>We\u2019re talking about all those funny names: phishing, smishing, smushing, vishing. Call them what you want, but most involve tricking the at-home crowd into believing the sender is a legitimate user. Notably, black-hat social engineers have taken advantage of COVID by pretending they represent various healthcare and charity organizations.<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/coronavirus-phishing-awareness-guide\/\">Coronavirus Phishing Awareness Guide<\/a><\/p>\n<p>Hackers are getting creative too. PDF files used to be considered hack-proof. A lot of people believe that this is still the case, but even electronic newsletters or invoices created from templates and saved in that format can be turned into a <a href=\"https:\/\/www.zdnet.com\/article\/hacker-finds-a-way-to-exploit-pdf-files-without-a-vulnerability\/\" target=\"_blank\" rel=\"noopener noreferrer\">malware delivery system<\/a>. Worse, the process is so sophisticated that most email scanners won\u2019t detect anything amiss.<\/p>\n<h3>Problem #3 - Hidden in the Chaos<\/h3>\n<p>While Congress has been busy adding trillions of dollars to the national debt through a variety of aid packages intended to replace the American economy, hackers have kept busy noticing that any time the government gives away money, they typically set up a bunch of new websites. The COVID response has been no different.<\/p>\n<p>Another thing hackers have noticed is that it\u2019s easy to set up a website built around a domain that is very close to the official one (like givememoney.com, instead of givememoney.gov) and load it down with malware that steals social security numbers, banking account numbers, and more. Desperate people -- and there are a lot of them these days -- often don\u2019t even notice that the URL is a scam, so gratefully turn over their personal data to the bad guys.<\/p>\n<p>It\u2019s like shooting fish in a barrel to drive traffic to the bogus site.<\/p>\n<p>Alternatively, hackers know that all these new, legitimate government sites likely have weak security in place, so breaking in is a simple matter.<\/p>\n<h2>Here\u2019s What the Smart CISOs Are Doing<\/h2>\n<p><span style=\"font-weight: 400;\">While the present COVID pandemic is certainly not the first crisis faced by cybersecurity departments, the scale and unpredictability are beyond anything ever encountered in modern times. This takes the ability to draw from past experience off the table. Though there has been no precise playbook to craft a response to COVID\u2019s specific security challenges, successful responses have included iterations of the following:<\/span><\/p>\n<h3>Focus on Mission-Critical<\/h3>\n<p>The middle of a pandemic is not the time to experiment with untested tools or technology unless it is in direct support of business operations. Instead, simplify where you can. Spend your time detecting, preventing, and mitigating threats that target operations. If you haven\u2019t used <a href=\"https:\/\/www.msp360.com\/resources\/blog\/two-factor-authentication-solutions\/\">multi-factor authentication<\/a> with employees before, now is the time to start. Likewise, do a roll call to make sure everyone knows <a href=\"https:\/\/privacycanada.net\/best-vpn\/\" target=\"_blank\" rel=\"noopener noreferrer\">how to connect to the Internet through a VPN<\/a> and why they should do it.<\/p>\n<h3>Test Incident Response<\/h3>\n<p>Hopefully, you already have detailed plans in place on the exact steps that should be taken in the event of a security incident. If not, create them immediately and run tests to make sure they are effective. The only thing worse than a compromised network is a compromised network that stays that way because no one knows how to seal it back up.<\/p>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\" style=\"width: 65%;\">\n<div class=\"call-to-action__title\">Responding to Data Breach: Guide for MSPs<\/div>\n<div class=\"call-to-action__text\">Learn how to create a flexible and robust data breach response plan and prepare for the unexpected.<\/div>\n<\/div>\n<div class=\"call-to-action__right\" style=\"width: 35%;\">\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/05\/PDF.png\" alt=\"Whitepaper icon\" \/><\/p>\n<p style=\"text-align: center;\"><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-62d663a3-9fca-42d8-9dc3-fdc92166abc0\" data-portal=\"5442029\" data-id=\"62d663a3-9fca-42d8-9dc3-fdc92166abc0\"><span class=\"hs-cta-node hs-cta-62d663a3-9fca-42d8-9dc3-fdc92166abc0\" id=\"hs-cta-62d663a3-9fca-42d8-9dc3-fdc92166abc0\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/62d663a3-9fca-42d8-9dc3-fdc92166abc0\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-62d663a3-9fca-42d8-9dc3-fdc92166abc0\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/62d663a3-9fca-42d8-9dc3-fdc92166abc0.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n<\/div>\n<\/div>\n<h3>Monitor Everything<\/h3>\n<p>Keep an especially close eye on <a href=\"https:\/\/blogs.timesofisrael.com\/security-risks-with-streaming-video\/\" target=\"_blank\" rel=\"noopener noreferrer\">new collaboration or software tools<\/a> the team uses. These are likely vulnerability points where <a href=\"https:\/\/www.msp360.com\/resources\/blog\/how-to-be-protected-against-ransomware\/\">new strains of malware will appear<\/a>. Also, watch employees and endpoints. The goal is to try and catch, isolate, and kill a new threat before it is able to have an adverse impact on operations.<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/endpoint-detection-and-response\/\">Endpoint Detection and Response (EDR) Explained<\/a><\/p>\n<h2>Final Thoughts<\/h2>\n<p>In the final analysis, keep in mind that your team hasn\u2019t made it their mission in life to drive you crazy. Everyone is dealing with work and personal challenges and trying to hold it all together until this COVID thing blows over. Have a little compassion and don\u2019t come unhinged when an innocent mistake by a well-intentioned remote worker hits you at the wrong time.<\/p>\n<p>We\u2019re all in this together, doing the best we can. While securing company assets from threats is your top priority, complete the task without becoming Darth Vader in the process. While we likely have months of uncertainty in front of us before normal dares to raise its head again, let\u2019s face these trying times with as much dignity as we can muster.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There\u2019s an ancient Chinese curse that goes something like this: may you live in interesting times. To be perfectly honest, I\u2019m hoping that these \u201cinteresting\u201d times return to normal sometime soon.<\/p>\n","protected":false},"author":66,"featured_media":40905,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877,884],"tags":[],"class_list":["post-40903","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-articles","category-msp-business-articles"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/40903","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/66"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=40903"}],"version-history":[{"count":1,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/40903\/revisions"}],"predecessor-version":[{"id":61463,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/40903\/revisions\/61463"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media\/40905"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=40903"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=40903"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=40903"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}