cxo voice
  • Home
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • News
  • Press Release
    • Submit Press Release
No Result
View All Result
  • Home
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • News
  • Press Release
    • Submit Press Release
No Result
View All Result
Leaders Talk and Latest Tech News | CXO VOICE
No Result
View All Result
Home News Cyber Security

Dealing with Cyber Security Challenges in the Post COVID-19 Era

Vikas Bhonsle by Vikas Bhonsle
June 26, 2020
Post Covid-19 cyber security

Image: Vikas Bhonsle

With COVID-19 hitting the headlines, it has forced most organizations to adopt new practices and norms such as Social Distancing, Sanitization, and Remote Working. While the world is combating this epidemic, we also have cyber criminals who are indeed capitalizing on this crisis. The COVID-19 epidemic has created a fresh and unlikely cyber security challenge for most organizations around the world.

Pre COVID-19, employees were accessing their corporate network through secured office laptops and devices. With the rise in employees working from home, enterprises have been forced to migrate to cloud services almost overnight. In this rapid rush, many security best practices have been overlooked.

Cloud services like enterprise chat rooms, online office suites, and drives are seeing widespread use nowadays for file sharing and communication. This creates novel problems since there are more unsecured devices being used by workers that are lacking the latest security updates and patches. Therefore, due to COVID-19, the work from home becoming the new normal, Cyber Security strategies need to get sharper, stronger and more relevant.

Let’s face it, we all know that security bugs and privacy hacking practices are not new. The traditional approach to security has been to look for outsiders who may try to break in and steal confidential data. That dynamic has now changed with the risks coming from within so to speak. Employees who lack training in security best practices may end up causing the leak of sensitive organizational data. Cyber security leaders must be willing to look at the bad actors or employees with malicious intent as well. This emerging threat is a serious factor to consider since a sudden influx of unsecured devices being used worldwide is a major risk.

To successfully prepare for this changing landscape, we need a new paradigm of security thinking and to use tools designed for use in such scenarios. To maintain cyber security, organizations should be proactive in advising Employees and Business Partners to be more cautious and alert when interacting with external parties, be it as simple as opening links, emails, or documents related to the subject COVID-19. One can never know what they are stepping into. It is better to stay safe than being sorry.

Organizations that will have to consider the new threat landscape are those who are dealing in large amounts of confidential or proprietary data. This sensitive information that was earlier kept secure will require new ways of safekeeping. Cybercriminals will be eager to take advantage of this new occurrence. We are sure to see sophisticated attacks that take advantage of this widespread change in working habits. We will be seeing new hacking tools and ransomware and phishing attacks being employed. Organizations should evaluate and explore new security defense tools and methods for areas where they foresee a huge risk.

ADVERTISEMENT

All organizations have business continuity plans, but no one would have anticipated or baked in a plan on how to manage COVID-19. It will be a good thought to revisit the Organization’s BCP plan. A risk assessment should be conducted across all processes of the Organization.

Tackling Insider Threats

A rogue employee can cause severe damage by connecting compromised devices to the company network and stealing proprietary information. To thwart such attacks, organizations must use security tools equipped with advanced analytics that track user behavior. Cyber security providers must factor in the human element as well while conducting threat assessments.

The tool must be reliant on multiple data sources to eliminate false positives. A typical employee uses multiple channels including SharePoint, Slack, Salesforce, and others to access and interact with company data. A mature cybersecurity solution should be able to access and analyze their user behavior from all these data sources. An advanced solution should also be able to differentiate malicious intent from normal usage.

These tools require the ability to track and record evidence of unlawful actions performed on company data. To deter insider attacks, one also requires video evidence and detailed logs to indicate malicious intent beyond a doubt. Any solution that seeks to implement this must have strong control measures to ensure that legitimate users are not affected.

Organizations should also make it a process to sensitize their employees around information security and should make use of GDPR to ensure that confidential information remains secure in case of theft or damage.

Conclusion

COVID-19 is here and is changing our lives, It has given rise to new lifestyles, new policies, approaches, and new cyber security threats. To protect intellectual property, organizations will have to transition from traditional security policies and doctrines to ones suited to a world where remote working will become increasingly common. A shift in thinking is required at a fundamental level to tackle these emerging threats. Be Smart and Stay Safe.


  • Top 10 Data and Analytics Technology Trends for 2020
  • Demystifying ransomware – the cyber pandemic
  • Security While Working Remotely [Interview]

Vikas Bhonsle

Vikas Bhonsle

Vikas Bhonsle, Chief Executive Officer at Crayon Software Experts India Pvt. Ltd. Vikas has an avid experience of 20 years in the field of IT with expertise in Sales, Marketing, Strategy Formulation, and Operational Management alongside basic growth needs like business development and client relationship management.

Related Posts

LTTS and Tennant
Business

LTTS Partners with Tennant Company to Accelerate Innovation in Sustainable Cleaning Technologies

June 4, 2025
Accenture and SIPAL
Business

Accenture to Acquire SIPAL’s Integrated Product Support Business, Enhancing Engineering Services in Aerospace and Defense

June 3, 2025
HCLTech and UiPath
Business

HCLTech and UiPath Join Forces to Revolutionize Automation and Enhance Business Efficiency Globally

June 3, 2025
(L-R) Amit Kapur, Country Head - UK & Ireland, TCS; Shai Weiss, CEO - Virgin Atlantic Signing the Partnership Document
Press Release

Virgin Atlantic and TCS Extend Two-Decade Partnership to Modernize Airline Operations

June 3, 2025
Michael Gonda
People

Michael Gonda Named New Executive Vice President and Chief Communications Officer at NIKE

June 3, 2025
ANACITY Partners with Spintly
Press Release

ANACITY Partners with Spintly to Deploy IoT-Powered Smart Access Mobile Apps Across Commercial Offices

June 3, 2025
Press Release

Lenovo and Bellevue University Team Up to Offer Supply Chain and Logistics Education to Deliver “Smarter Technology for All”

June 3, 2025
Venu Lambu
People

Debashis Chatterjee Retires as LTIMindtree CEO; Venu Lambu Appointed as Successor

May 30, 2025
Load More
Please login to join discussion
ADVERTISEMENT

Latest Updates

LTTS and Tennant

LTTS Partners with Tennant Company to Accelerate Innovation in Sustainable Cleaning Technologies

by News Desk
1 day ago

Accenture and SIPAL

Accenture to Acquire SIPAL’s Integrated Product Support Business, Enhancing Engineering Services in Aerospace and Defense

by Deepa Sharma
2 days ago

HCLTech and UiPath

HCLTech and UiPath Join Forces to Revolutionize Automation and Enhance Business Efficiency Globally

by Deepa Sharma
2 days ago

(L-R) Amit Kapur, Country Head - UK & Ireland, TCS; Shai Weiss, CEO - Virgin Atlantic Signing the Partnership Document

Virgin Atlantic and TCS Extend Two-Decade Partnership to Modernize Airline Operations

by News Desk
2 days ago

Michael Gonda

Michael Gonda Named New Executive Vice President and Chief Communications Officer at NIKE

by Deepa Sharma
2 days ago

ANACITY Partners with Spintly

ANACITY Partners with Spintly to Deploy IoT-Powered Smart Access Mobile Apps Across Commercial Offices

by News Desk
2 days ago

Expert Views

Opinion

When AI Empowers Both Networks and Hackers: The New Battlefield for India’s Telecoms

May 20, 2025
Molly Sands AI
AI

AI RIP: 5 Things Knowledge Workers Will Say ‘Sayonara’ to in the Next Decade

March 8, 2025
multi cloud
Cloud

Multi-Cloud Made Simple: Strategies for Smart Business Management

March 5, 2025
Soft Skills
Opinion

Soft Skills and Technical Know-How: A Winning Combination in the Tech Industry

March 4, 2025
Digital Freedom
Cyber Security

Your Data, Their Gold: The Silent Battle for Digital Freedom

February 25, 2025

Get Latest Update

Subscribe to our mailing list to receives newsletter direct to your inbox!

ADVERTISEMENT

Leaders Interviews

Steve Wilson, GenAI Cybersecurity LLMs
Cyber Security

How effective is GenAI in cybersecurity? The role of LLMs and AI in security solutions. [Interview with Steve Wilson]

-
Interview on Counterfeit products with Nikhil Narayan
Leaders Talk

Advancements in ML & AI made it possible to detect counterfeit products in real-time, says Nikhil Narayan

-
Newgenone bridges the gap between business users and IT teams with its low code capability: Varun Goswami
Leaders Talk

Newgenone bridges the gap between business users and IT teams with its low code capability: Varun Goswami

-
AI chatbots, Prasanna-Kumar
Leaders Talk

Can AI chatbots enhance customer experience and reduce the cost of serving customers?

-

Entrepreneur

Samsung Electronics appoints its first female president

Inspiring Women Entrepreneurs in India (2022)

Technology Adoption For Entrepreneurs

Volunteering management is the need of the Hour

CXOVoice.com is a leading online publication for CXOs, entrepreneurs, senior leaders, developers, and industry professionals. Our coverage spans key sectors, including IT, technology, banking, finance, cybersecurity, engineering, and automobiles.

Connect with us

Easy Links

  • Cryptocurrency
  • Event
  • Blockchain
  • Press Release
  • Resources & Downloads

Write Us

[email protected]
  • Home
  • About Us
  • Contact Us
  • Advertise
  • Privacy & Policy
  • Feedback

Copyright © 2025 CXOVoice - All Right Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Our Spring Sale Has Started

You can see how this popup was set up in our step-by-step guide: https://wppopupmaker.com/guides/auto-opening-announcement-popups/

No Result
View All Result
  • Home
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • News
  • Press Release
    • Submit Press Release

Copyright © 2025 CXOVoice - All Right Reserved