cxo voice
  • Business
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • Press Release
    • Submit Press Release
No Result
View All Result
  • Business
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • Press Release
    • Submit Press Release
No Result
View All Result
Leaders Talk and Latest Tech News | CXO VOICE
No Result
View All Result
Home News Cyber Security

Dealing with Cyber Security Challenges in the Post COVID-19 Era

Vikas Bhonsle by Vikas Bhonsle
June 26, 2020
A A
Post Covid-19 cyber security

Image: Vikas Bhonsle

With COVID-19 hitting the headlines, it has forced most organizations to adopt new practices and norms such as Social Distancing, Sanitization, and Remote Working. While the world is combating this epidemic, we also have cyber criminals who are indeed capitalizing on this crisis. The COVID-19 epidemic has created a fresh and unlikely cyber security challenge for most organizations around the world.

Pre COVID-19, employees were accessing their corporate network through secured office laptops and devices. With the rise in employees working from home, enterprises have been forced to migrate to cloud services almost overnight. In this rapid rush, many security best practices have been overlooked.

Cloud services like enterprise chat rooms, online office suites, and drives are seeing widespread use nowadays for file sharing and communication. This creates novel problems since there are more unsecured devices being used by workers that are lacking the latest security updates and patches. Therefore, due to COVID-19, the work from home becoming the new normal, Cyber Security strategies need to get sharper, stronger and more relevant.

Let’s face it, we all know that security bugs and privacy hacking practices are not new. The traditional approach to security has been to look for outsiders who may try to break in and steal confidential data. That dynamic has now changed with the risks coming from within so to speak. Employees who lack training in security best practices may end up causing the leak of sensitive organizational data. Cyber security leaders must be willing to look at the bad actors or employees with malicious intent as well. This emerging threat is a serious factor to consider since a sudden influx of unsecured devices being used worldwide is a major risk.

To successfully prepare for this changing landscape, we need a new paradigm of security thinking and to use tools designed for use in such scenarios. To maintain cyber security, organizations should be proactive in advising Employees and Business Partners to be more cautious and alert when interacting with external parties, be it as simple as opening links, emails, or documents related to the subject COVID-19. One can never know what they are stepping into. It is better to stay safe than being sorry.

Organizations that will have to consider the new threat landscape are those who are dealing in large amounts of confidential or proprietary data. This sensitive information that was earlier kept secure will require new ways of safekeeping. Cybercriminals will be eager to take advantage of this new occurrence. We are sure to see sophisticated attacks that take advantage of this widespread change in working habits. We will be seeing new hacking tools and ransomware and phishing attacks being employed. Organizations should evaluate and explore new security defense tools and methods for areas where they foresee a huge risk.

ADVERTISEMENT

All organizations have business continuity plans, but no one would have anticipated or baked in a plan on how to manage COVID-19. It will be a good thought to revisit the Organization’s BCP plan. A risk assessment should be conducted across all processes of the Organization.

Tackling Insider Threats

A rogue employee can cause severe damage by connecting compromised devices to the company network and stealing proprietary information. To thwart such attacks, organizations must use security tools equipped with advanced analytics that track user behavior. Cyber security providers must factor in the human element as well while conducting threat assessments.

The tool must be reliant on multiple data sources to eliminate false positives. A typical employee uses multiple channels including SharePoint, Slack, Salesforce, and others to access and interact with company data. A mature cybersecurity solution should be able to access and analyze their user behavior from all these data sources. An advanced solution should also be able to differentiate malicious intent from normal usage.

These tools require the ability to track and record evidence of unlawful actions performed on company data. To deter insider attacks, one also requires video evidence and detailed logs to indicate malicious intent beyond a doubt. Any solution that seeks to implement this must have strong control measures to ensure that legitimate users are not affected.

Organizations should also make it a process to sensitize their employees around information security and should make use of GDPR to ensure that confidential information remains secure in case of theft or damage.

Conclusion

COVID-19 is here and is changing our lives, It has given rise to new lifestyles, new policies, approaches, and new cyber security threats. To protect intellectual property, organizations will have to transition from traditional security policies and doctrines to ones suited to a world where remote working will become increasingly common. A shift in thinking is required at a fundamental level to tackle these emerging threats. Be Smart and Stay Safe.


  • Top 10 Data and Analytics Technology Trends for 2020
  • Demystifying ransomware – the cyber pandemic
  • Security While Working Remotely [Interview]

Vikas Bhonsle

Vikas Bhonsle

Vikas Bhonsle, Chief Executive Officer at Crayon Software Experts India Pvt. Ltd. Vikas has an avid experience of 20 years in the field of IT with expertise in Sales, Marketing, Strategy Formulation, and Operational Management alongside basic growth needs like business development and client relationship management.

Related Posts

Check Point Quantum Firewall
Cyber Security

Check Point Launches Quantum Firewall Software R82.10 to Secure the AI-Driven Enterprise

December 5, 2025
Electric Vehicles on the Road
EV

Gartner Forecasts 116 Million Electric Vehicles on the Road by 2026, Signalling a Pivotal Shift in Global Mobility

December 5, 2025
ABB invests in OctaiPipe to partner in AI-optimized energy efficiency for data centre cooling
Business

ABB invests in OctaiPipe to partner in AI-optimized energy efficiency for data centre cooling

December 4, 2025
India Cyber Threat Report
News

India Records 265 Million Cyber Attacks; Seqrite Releases the India Cyber Threat Report 2026

December 4, 2025
AI in Manufacturing
AI

AI Set to Reshape Manufacturing Profitability, Insights from TCS Study

December 4, 2025
Ericsson Partners with LotusFlare
Business

Ericsson Partners with LotusFlare to Boost adoption of network APIs

December 3, 2025
Avathon and Google
Business

Avathon and Google Cloud Unveil Autonomous Intelligence Platform for Energy Operations

December 3, 2025
ING Broadcom
Business

ING Partners with Broadcom to Modernize Private Cloud Infrastructure with VMware Cloud Foundation 9.0

December 3, 2025
Load More
ADVERTISEMENT

Latest Updates

Check Point Quantum Firewall

Check Point Launches Quantum Firewall Software R82.10 to Secure the AI-Driven Enterprise

by Deepa Sharma
16 hours ago

Electric Vehicles on the Road

Gartner Forecasts 116 Million Electric Vehicles on the Road by 2026, Signalling a Pivotal Shift in Global Mobility

by News Desk
16 hours ago

ABB invests in OctaiPipe to partner in AI-optimized energy efficiency for data centre cooling

ABB invests in OctaiPipe to partner in AI-optimized energy efficiency for data centre cooling

by News Desk
2 days ago

India Cyber Threat Report

India Records 265 Million Cyber Attacks; Seqrite Releases the India Cyber Threat Report 2026

by Deepa Sharma
2 days ago

AI in Manufacturing

AI Set to Reshape Manufacturing Profitability, Insights from TCS Study

by Deepa Sharma
2 days ago

Ericsson Partners with LotusFlare

Ericsson Partners with LotusFlare to Boost adoption of network APIs

by Deepa Sharma
3 days ago

Expert Views

India's Cybersecurity ecosystem
Cyber Security

Inside India’s $20 Billion Cybersecurity Ecosystem: Growth, Challenges, and the Road Ahead

November 11, 2025
From Coaches to Control Rooms: 5 Trends Shaping Railway Smart Video Storage
Opinion

From Coaches to Control Rooms: 5 Trends Shaping Railway Smart Video Storage

November 8, 2025
AI Underwriter
AI

Why AI is the Underwriter’s Strongest Ally

October 30, 2025
agentic AI threats
Cyber Security

Top 10 agentic AI threats, and how to defend against them

October 17, 2025
Your Face, Your Data: The Hidden Risks of Uploading to AI Tools
Cyber Security

Your Face, Your Data: The Hidden Risks of Uploading to AI Tools

October 7, 2025

Get Latest Update

Subscribe to our mailing list to receives newsletter direct to your inbox!

ADVERTISEMENT

Leaders Interviews

NewgenONE
Interview

Reimagining Enterprise Transformation: Varun Goswami on the Future of NewgenONE and AI-Driven Automation

-
Jagat Shah, Chairman & CEO of MITSUMI Group
Leaders Talk

Leadership in Emerging Markets: Exclusive Interview with Jagat Shah, Chairman & CEO of MITSUMI Distribution

-
Tokenization
Interview

Revolutionizing Finance: An Exclusive Interview with Sid Ugrankar, Co-founder of Qila.io on the Future of Blockchain and Tokenization

-
Steve Wilson, GenAI Cybersecurity LLMs
Cyber Security

How effective is GenAI in cybersecurity? The role of LLMs and AI in security solutions. [Interview with Steve Wilson]

-

Entrepreneur

Persistent Gender Bias Clouds Perceptions of Leadership in Tech: Study Finds

Top Leadership Skills Entrepreneurs Need in the Age of AI

Samsung Electronics appoints its first female president

Inspiring Women Entrepreneurs in India (2022)

CXOVoice.com is a leading online publication for CXOs, entrepreneurs, senior leaders, developers, and industry professionals. Our coverage spans key sectors, including IT, technology, banking, finance, cybersecurity, engineering, and automobiles.

Connect with us

Easy Links

  • Cryptocurrency
  • Event
  • Blockchain
  • Press Release
  • Resources & Downloads

Write Us

[email protected]
  • Home
  • About Us
  • Contact Us
  • Advertise
  • Privacy & Policy
  • Feedback

Copyright © 2025 CXOVoice - All Right Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Our Spring Sale Has Started

You can see how this popup was set up in our step-by-step guide: https://wppopupmaker.com/guides/auto-opening-announcement-popups/

No Result
View All Result
  • Home
  • News
  • Business
  • Technology
  • Cyber Security
  • Opinion
  • Leaders Talk

Copyright © 2025 CXOVoice - All Right Reserved