Blog Posts Business Management

Cybersecurity in Post-COVID Environment: Time for C-Level Executives to Devise New Strategy

Blog: NASSCOM Official Blog

As COVID-19 restrictions have started slackening, people are transitioning back to their offices and social calendar. Unfortunately, this shift is expected to introduce an increased threat of malicious activities. The risk is comparatively higher for those organizations who have not provided their remote employees with adequate VPN and regular software updates. Employees of such organizations exposed to a variety of threats as they were connected to their home network, which lacks required security measures.

Glance through some common risks that employees may have experienced while working from home. 

Risk of Dormant Malware

Threat actors have largely exploited the remote workforce during the lockdown with COVID-themed phishing emails containing malevolent URLs and attachments to get access to victim’s sensitive personal and corporate information. They have also infected systems with different strains of malware that have stayed dormant and may get active once those systems are reconnected to the office networks. Post successful execution, such malware may trigger dreadful cybersecurity incidents and cause massive loss to an organization, both financially and reputationally.

Improper Security Configuration

Lack of proper security configuration is another element that has fueled the growing momentum of cyber-attacks globally. For several organizations, the remote management of employees’ computer systems has been challenging so far. For instance, providing VPN to such a great extent was not feasible for every organization. Also, it cannot be overlooked that employees may not have given sufficient attention to update their work devices or install required security patches while working from home. Linking those devices back to the corporate network may permit malicious activists to exploit the security loopholes in the systems and bring an organization to its knees.

Ransomware, data breaches, social engineering, phishing and malware attacks have surged exponentially during COVID times and impacted organizations globally, irrespective of their vertical. Now, when the employees are returning to the offices, all the C-level executives and security teams must collaborate and work closely to define a new strategy to use technology, tools, people and processes smartly. Gartner has also predicted that cyber-physical security incidents will result in personal liability for 75% of CEOs by 2024. So, they need to remain more cautious than ever before while defending the digital assets of their organization.

Here, we will look at some important steps that can be employed to address potential cyber threats and reduce the chances for threat actors to infiltrate.

  • Security Assessment of IT Infrastructure

The first step towards resumption of work from offices should be a thorough assessment of the entire IT infrastructure. The C-level executives, including CISOs and CIOs, must have a clear understanding of the organization’s current cybersecurity posture as the prolonged inactivity may have surfaced some unpatched vulnerabilities.

  • Expand Cybersecurity Budget

Spending on information security and risk assessment will help organizations to create a robust and resilient infrastructure, repel complex cyber-attacks and minimize the chances of data breaches and leaks. Not long ago, Gartner has also predicted that information security spending is expected to grow 2.4% to reach $123.8 billion in 2020.

  • Examine Employees’ Devices for Vulnerabilities

A majority of organizations have provided their employees with laptops and desktops to continue work from home during the lockdown. It is possible that those systems may get infected with some virus or trojans since they were not connected to the office network. This could be potentially dangerous when those devices will be reconnected to the corporate network as threat actors might exploit the hidden vulnerabilities to cause damage to the organization. Ideally, all such devices should be submitted to the IT team for virus scan and security patches before usage.

  • Allow Sufficient Resources Only

Organizations can identify and allow resources that have privileged access to critical business data and are at increased risk of being exploited by the cybercriminals to resume work from offices. This can help in removing pressure from IT teams working to patch employees’ work devices and mitigating the risk of cybersecurity incidents.

  • Conduct Security Awareness Training

Security awareness training is supposed to be the most important practice towards ensuring cybersecurity as employees have been accustomed to certain habits while working from home, which may pose risks to an organization’s security. Such awareness programs will help in educating employees about the security obligations that they need to follow at the workplace and in staying aware of the new emerging cyber threats.

  • Implement a Zero Trust Model

Zero Trust model is based on the principle – Trust no one, verify all. Since the number of endpoints has continued to rise, it is increasingly becoming difficult to define a security perimeter. An ideal approach would be to adopt a Zero Trust model which ensures that the business-critical applications and information are accessible only to authenticated users and devices.

 

In the post-COVID environment, organizations, especially their C-level executives need to remain vigilant to different complex cyber threats and vulnerabilities that could arise when employees start working from the workplace. Security teams need to take the opportunity to recheck the efficacy of existing security controls and implement good cyber hygienic activities like virus scans and network traffic monitoring to prevent unauthorised users from accessing the company’s network. This article was originally published on Tata Advanced Systems

The post Cybersecurity in Post-COVID Environment: Time for C-Level Executives to Devise New Strategy appeared first on NASSCOM Community |The Official Community of Indian IT Industry.

Leave a Comment

Get the BPI Web Feed

Using the HTML code below, you can display this Business Process Incubator page content with the current filter and sorting inside your web site for FREE.

Copy/Paste this code in your website html code:

<iframe src="https://www.businessprocessincubator.com/content/cybersecurity-in-post-covid-environment-time-for-c-level-executives-to-devise-new-strategy/?feed=html" frameborder="0" scrolling="auto" width="100%" height="700">

Customizing your BPI Web Feed

You can click on the Get the BPI Web Feed link on any of our page to create the best possible feed for your site. Here are a few tips to customize your BPI Web Feed.

Customizing the Content Filter
On any page, you can add filter criteria using the MORE FILTERS interface:

Customizing the Content Filter

Customizing the Content Sorting
Clicking on the sorting options will also change the way your BPI Web Feed will be ordered on your site:

Get the BPI Web Feed

Some integration examples

BPMN.org

XPDL.org

×