Welcome to part four of our six-part blog series based on our recent whitepaper entitled ‘COVID-19: A biological hazard goes digital.’ If you haven’t read the first three parts of this blog series, you’ll find them in the insights tab (via our blog page) on our website here. Be sure to check them out!
In light of the changing emergent threat model we explored in parts one, two and three, in this blog we’ll be offering guidance to businesses and professionals considering the cyber element of what might be the most serious threat to global well-being since World War 2.
The world is in a state of panic right now. Ironically, the security industry has been sadly vulnerable to and shamefully guilty of exploiting such fear, uncertainty and doubt in the past. But as cybersecurity professionals, we need to consider our cyber response strategies calmly, without aggravating the situation and creating unnecessary panic.
While we find ourselves in a state of heightened threat, we’re not necessarily experiencing an increase in vulnerability. We can’t control the threat, but we can control the vulnerability, so we should focus on that. This means working smart, rather than hard – focusing our energy on considering the primary cyber concerns for our businesses and looking to address those one by one. Forming partnerships with suppliers, service providers and even competitors can help you keep a level head – they may not have all the answers, but given we’re all in the same boat, they may have balanced, rational or opposing views that can help you to make informed decisions about your own cyber strategy.
With this in mind, here’s just a few of our guidelines for approaching the cyber threats stemming from COVID-19:
As previously argued, we want to focus our strained resources on elements of the threat that are of most concern to us. We would like to propose the following set of general priorities for businesses to consider in responding to the cyber threats arising from COVID-19.
The above is just a glimpse of all of the guidelines and priorities you can find in full in our whitepaper. Check it out for more information on how to better protect your business from cyber risk during the COVID-19 pandemic.
In part five of our six-part blog series, we’ll move on to exploring what the business landscape looks like when our current crisis is over, and employees start returning to work. There will be a few things to expect and look out for!