The numbers are up! According to the latest report by Check Point Research, there has been a 30% increase in reported COVID-19-related cyberattacks every week over the last three weeks. Given that millions of workers are working from home right now, the increase is not surprising.
As businesses around the world implemented a work from home (WFH) operating model, IT, security and management teams worked hard to facilitate a strong and secure infrastructure. WFH operations present significant cyber risks if all aspects of security were not properly considered. In the rush to keep businesses up and running when the pandemic hit, was anything missed?
In our recent Fast Fast Forward Live webinar, cybersecurity experts from AXA XL, S-RM and Mullen Coughlin discuss the impact of COVID-19 on cyber security. The on-demand webinar asks the critical questions businesses have to consider during this time and how this pandemic will change the cyber threat environment moving forward.
Elissa Doroff, Underwriting and Product Manager of Cyber & Technology, AXA XL
Billy Gouveia, Senior Managing Director, Cyber Security, S-RM
Sian Schafle, Partner, Data Privacy and Network Security Practice, Mullen Coughlin
The Pandemic Exploit: Cyber criminals ramping up phishing attacks amid COVID-19 crisis
April 03, 2020
In mid-March 2020, as the COVID-19 pandemic was exploding in the US, the attack came. Hackers hit the Department of Health and Human Services with a breach of its systems, unleashing a disruption and disinformation campaign designed to undermine the US response to the pandemic.
As the country’s
Changing working patterns
With the ongoing spread of coronavirus, government guidance is changing rapidly. In many countries, healthy individuals are being asked for the first time to avoid unnecessary public exposure, for example at large gatherings, on public transport … and in the workplace.
When Microsoft released patches on January 14, 2020, it revealed one of the most critical vulnerabilities it has discovered in years. The company confirmed a serious security vulnerability in the way Windows CryptoAPI (Crypt.dll) validates Elliptic Curve Cryptography (ECC) certificates, disclosed to