COVID-19 and Cybersecurity: Best Practices in an Uncertain Landscape

Carlton Fields
Contact

Carlton Fields

For many people and organizations, COVID-19 caused a rapid transition to remote learning and working; for hackers and other bad actors, it has created new opportunities. Whether by virtue of a remote and distracted workforce, a strained IT infrastructure, or both, this difficult time is proving ripe for cyberattacks and cybercrime. With that in mind, we offer these steps that all organizations should take now to boost their cybersecurity:

  1. Make sure your system is properly patched and event logs are turned on.

Even if you had a fairly robust system for remote work in place before, make sure its cybersecurity technical controls are up to date. Have you applied all the necessary patches? Most hacks exploit patchable vulnerabilities. It is an easy fix that can save serious money. Additionally, ask your IT professionals whether you have appropriate network event logs in place in the event of suspicious activity, to help create a record of who is coming in and out of your network, and when.

  1. Remind your employees to remain vigilant.

Your employees should be reminded that they need to be on guard for cyberattacks, especially an increase in phishing, business email compromise, malware, and ransomware attacks.

  • Phishing and business email compromise. Phishing attacks have already started that take advantage of the fact that people will no longer be sitting in the office together and may be more distracted by the news or commitments at home. This may prompt those employees to be less on guard for attempts to compromise their login credentials, for attempted business email compromise schemes, and for payment diversion fraud. To combat these threats, remind your employees to delete or report suspicious emails, avoid clicking on links or attachments without checking their source, and confirm wire payments through trusted channels. Enable multifactor authentication for system access, if you have not already done so. If your existing wire controls involve in-person confirmation, determine how to adjust them during a work-from-home period without compromising security, such as deploying real-time video confirmation. Remind employees how to report suspicious cyber activity, and through which channels.
  • Malware, including ransomware. Criminals will likely look to exploit this chaotic time and distracted workforces to install malware, including ransomware, on organizations’ systems. As with phishing and business email compromise, the attack vector may be a legitimate-looking email, such as an invitation to a file-sharing site or an email communication from a trusted vendor. Employees need to remain watchful for such attempts. Organizations also should ensure that employees save files to the corporate systems, that the IT staff backs up those systems regularly, and that their incident response plan is available for activation. Finally, in the event of a ransomware event, corporate decision-makers should know how to get in touch with key outside systems partners, such as cloud service providers, a managed service provider if you use one, or any backup or disaster recovery vendors.
  1. Monitor your system use.

If your system is compromised, you will want to detect and shut it down as quickly as possible. To that end, keep an eye out for suspicious network activity, like repeated failed login attempts, unusual login activity, or logins using IP addresses from locations where your workforce is not present. To this end, remind your IT staff not to share password information by phone, even if the person on the other end claims to be an executive calling from an unknown “home” phone number.

  1. Review your insurance policies.

Finally, understand your insurance policies, including any cyber policy. Your incident response plan should have contact information for your broker and carrier, and you will want to understand your coverages and what tools are provided by that policy, such as quick access to preapproved service providers. Having this information readily available will cut down on critical response times in the event of a successful cyberattack. Executives and IT/IS professionals should print this information and keep it with them during work-from-home periods.

Conclusion

In this time of uncertainty and disruption, organizations need to focus on the safety and security of their operations, their customers, and their employees. Cybersecurity is a key component of that effort and should not be disregarded. Heeding these tips can go a long way to protecting the organization and maintaining stability going forward.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Carlton Fields | Attorney Advertising

Written by:

Carlton Fields
Contact
more
less

Carlton Fields on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide

This website uses cookies to improve user experience, track anonymous site usage, store authorization tokens and permit sharing on social media networks. By continuing to browse this website you accept the use of cookies. Click here to read more about how we use cookies.