cxo voice
  • Business
  • Technology
    • Artificial Intelligence
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • CXO Insights
  • Cyber Security
  • CXO Interviews
No Result
View All Result
  • Business
  • Technology
    • Artificial Intelligence
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • CXO Insights
  • Cyber Security
  • CXO Interviews
No Result
View All Result
Leaders Talk and Latest Tech News | CXO VOICE
No Result
View All Result
Home Cyber Security

Dealing with Cyber Security Challenges in the Post COVID-19 Era

Vikas Bhonsle by Vikas Bhonsle
June 26, 2020
Post Covid-19 cyber security

Image: Vikas Bhonsle

With COVID-19 hitting the headlines, it has forced most organizations to adopt new practices and norms such as Social Distancing, Sanitization, and Remote Working. While the world is combating this epidemic, we also have cyber criminals who are indeed capitalizing on this crisis. The COVID-19 epidemic has created a fresh and unlikely cyber security challenge for most organizations around the world.

Pre COVID-19, employees were accessing their corporate network through secured office laptops and devices. With the rise in employees working from home, enterprises have been forced to migrate to cloud services almost overnight. In this rapid rush, many security best practices have been overlooked.

Cloud services like enterprise chat rooms, online office suites, and drives are seeing widespread use nowadays for file sharing and communication. This creates novel problems since there are more unsecured devices being used by workers that are lacking the latest security updates and patches. Therefore, due to COVID-19, the work from home becoming the new normal, Cyber Security strategies need to get sharper, stronger and more relevant.

Let’s face it, we all know that security bugs and privacy hacking practices are not new. The traditional approach to security has been to look for outsiders who may try to break in and steal confidential data. That dynamic has now changed with the risks coming from within so to speak. Employees who lack training in security best practices may end up causing the leak of sensitive organizational data. Cyber security leaders must be willing to look at the bad actors or employees with malicious intent as well. This emerging threat is a serious factor to consider since a sudden influx of unsecured devices being used worldwide is a major risk.

To successfully prepare for this changing landscape, we need a new paradigm of security thinking and to use tools designed for use in such scenarios. To maintain cyber security, organizations should be proactive in advising Employees and Business Partners to be more cautious and alert when interacting with external parties, be it as simple as opening links, emails, or documents related to the subject COVID-19. One can never know what they are stepping into. It is better to stay safe than being sorry.

Organizations that will have to consider the new threat landscape are those who are dealing in large amounts of confidential or proprietary data. This sensitive information that was earlier kept secure will require new ways of safekeeping. Cybercriminals will be eager to take advantage of this new occurrence. We are sure to see sophisticated attacks that take advantage of this widespread change in working habits. We will be seeing new hacking tools and ransomware and phishing attacks being employed. Organizations should evaluate and explore new security defense tools and methods for areas where they foresee a huge risk.

All organizations have business continuity plans, but no one would have anticipated or baked in a plan on how to manage COVID-19. It will be a good thought to revisit the Organization’s BCP plan. A risk assessment should be conducted across all processes of the Organization.

Tackling Insider Threats

A rogue employee can cause severe damage by connecting compromised devices to the company network and stealing proprietary information. To thwart such attacks, organizations must use security tools equipped with advanced analytics that track user behavior. Cyber security providers must factor in the human element as well while conducting threat assessments.

The tool must be reliant on multiple data sources to eliminate false positives. A typical employee uses multiple channels including SharePoint, Slack, Salesforce, and others to access and interact with company data. A mature cybersecurity solution should be able to access and analyze their user behavior from all these data sources. An advanced solution should also be able to differentiate malicious intent from normal usage.

These tools require the ability to track and record evidence of unlawful actions performed on company data. To deter insider attacks, one also requires video evidence and detailed logs to indicate malicious intent beyond a doubt. Any solution that seeks to implement this must have strong control measures to ensure that legitimate users are not affected.

Organizations should also make it a process to sensitize their employees around information security and should make use of GDPR to ensure that confidential information remains secure in case of theft or damage.

Conclusion

COVID-19 is here and is changing our lives, It has given rise to new lifestyles, new policies, approaches, and new cyber security threats. To protect intellectual property, organizations will have to transition from traditional security policies and doctrines to ones suited to a world where remote working will become increasingly common. A shift in thinking is required at a fundamental level to tackle these emerging threats. Be Smart and Stay Safe.


  • Top 10 Data and Analytics Technology Trends for 2020
  • Demystifying ransomware – the cyber pandemic
  • Security While Working Remotely [Interview]

Vikas Bhonsle

Vikas Bhonsle

Vikas Bhonsle, Chief Executive Officer at Crayon Software Experts India Pvt. Ltd. Vikas has an avid experience of 20 years in the field of IT with expertise in Sales, Marketing, Strategy Formulation, and Operational Management alongside basic growth needs like business development and client relationship management.

Related Posts

India’s AI
Business

Who Will Dominate India’s AI Infrastructure, Ambani and Adani or Global Tech?

February 20, 2026
Kyndryl cyber
Cyber Security

Kyndryl Launches First Cyber Defense Operations Center in Bengaluru

February 19, 2026
AI India
Artificial Intelligence

AI as a Public Good: From Democratic Principles to Ground-Level Practice

February 13, 2026
AI Hackathon
News

TCS Hosts AI Hackathon for Non-Engineering Students

February 12, 2026
Palo Alto Acquisition of CyberArk
Cyber Security

Palo Alto Networks Completes Acquisition of CyberArk to Lead in AI-Era Security

February 12, 2026
Cyber Resilience
Cyber Security

Why Identity Will Define Enterprise Cyber Resilience in an AI-First World

February 10, 2026
SAP AI Skills
News

SAP Aims to Help 12 Million Workers Gain AI Skills by 2030

February 6, 2026
IBM Impact
News

IBM Impact Accelerator: Seeks AI Solutions for Education and Workforce Development

February 5, 2026
Load More

More Articles

Airtel NBFC

Airtel Bets Big on Financial Services With ₹20,000 Crore NBFC Plan

by Arshi Khan
February 23, 2026

TCS and ServiceNow

TCS and ServiceNow Announce Partnership to Scale AI Adoption Across Enterprises

by Deepa Sharma
February 23, 2026

Zscaler and Bharti Airtel

Zscaler and Bharti Airtel Launch India AI & Cyber Threat Research Center

by Deepa Sharma
February 23, 2026

HCLTech VisionX 2.0

HCLTech Unveils VisionX 2.0: Multi-Modal Edge AI Platform Powered by NVIDIA for Real-Time Industrial Intelligence

by Deepa Sharma
February 23, 2026

Get Weekly CXO Intelligence.

Loading

CXO Insights

AI India
Artificial Intelligence

AI as a Public Good: From Democratic Principles to Ground-Level Practice

by News Desk
February 13, 2026
Cyber Resilience
Cyber Security

Why Identity Will Define Enterprise Cyber Resilience in an AI-First World

by Sunil Sharma
February 10, 2026
HDDs storage
Opinion

5 Reasons HDDs Will Continue to Dominate Enterprise Storage in the AI Era

by Owais Mohammed
January 13, 2026
Cybersecurity predictions 2026
Cyber Security

Prioritizing Proactive Cybersecurity as a Strategic Advantage: The Top 5 Predictions for India in 2026

by Heba Sayed
December 23, 2025

CXO Interviews

1Point1
Business

How 1Point1 Solutions Is Betting Its Future on AI to Redefine BPM

>
NewgenONE
Business

Reimagining Enterprise Transformation: Varun Goswami on the Future of NewgenONE and AI-Driven Automation

>
Jagat Shah, Chairman & CEO of MITSUMI Group
Business

Leadership in Emerging Markets: Exclusive Interview with Jagat Shah, Chairman & CEO of MITSUMI Distribution

>
Tokenization
Blockchain

Revolutionizing Finance: An Exclusive Interview with Sid Ugrankar, Co-founder of Qila.io on the Future of Blockchain and Tokenization

>

CXOVoice.com is a leading online publication for CXOs, entrepreneurs, senior leaders, developers, and industry professionals. We publish informed analysis, news reporting, expert commentary, and expert insights across enterprise technology, digital transformation, cybersecurity, data, AI, sustainability, and governance.

Connect with us

Easy Links

  • Cryptocurrency
  • Company Announcements
  • Event
  • Blockchain
  • Resources & Downloads
Loading
  • Home
  • About Us
  • Contact Us
  • Advertise
  • Privacy & Policy
  • Editorial Policy
  • Feedback

Copyright © 2026 CXOVoice - All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Our Spring Sale Has Started

You can see how this popup was set up in our step-by-step guide: https://wppopupmaker.com/guides/auto-opening-announcement-popups/

No Result
View All Result
  • Home
  • News
  • Business
  • Technology
  • Cyber Security
  • Opinion

Copyright © 2026 CXOVoice - All Rights Reserved