Pandemic Response: Remote Work Can Tip the Scale of Vulnerability
- Date:March 23, 2020
- Author(s):
- Mathieu Auger-Perreault
- John Buzzard
- Report Details: 5 pages, 2 graphics
- Research Topic(s):
- Cybersecurity
- Fraud & Security
- PAID CONTENT
Overview
COVID-19 has triggered an international response that is unprecedented in terms of how enterprises engage during a pandemic. Until recently, such an event was largely a fictional exercise of documenting what might occur and business continuity impacts. The majority of U.S. businesses have not tested an all-encompassing pandemic action plan beyond the creation of documents that serve as checkboxes for compliance. The overarching response to preventing the spread of coronavirus through self-quarantine has now propelled the workplace into a rapid migration away from physical offices and work-related events. COVID-19 has triggered an international response that is unprecedented in terms of how enterprises engage during a pandemic. Until recently, such an event was largely a fictional exercise of documenting what might occur and business continuity impacts. The majority of U.S. businesses have not tested an all-encompassing pandemic action plan beyond the creation of documents that serve as checkboxes for compliance. The overarching response to preventing the spread of coronavirus through self-quarantine has now propelled the workplace into a rapid migration away from physical offices and work-related events.
Book a Meeting with the Author
Related content
Data Transparency in the Age of Cyber and Privacy Risk
As open banking and new privacy regulations accelerate, financial institutions face rising pressure to enhance privacy and cybersecurity transparency to strengthen consumer trust. ...
Quishing and the Resurgence of BYOD Cyber-Attack Exposure
North Korean attackers’ latest efforts to target foreign policy experts through a technique known as quishing expose long-standing bring-your-own-device vulnerabilities that U.S. o...
SMS Blasters: An Expanding Frontier in Smishing Attacks
Cybercriminals use SMS/text blasters in smishing attacks, sending a wide range of fraudulent messages. By mimicking legitimate cell towers, SMS/text blasters bypass carrier-level p...
Make informed decisions in a digital financial world