Pandemic Response: Remote Work Can Tip the Scale of Vulnerability
- Date:March 23, 2020
- Author(s):
- Mathieu Auger-Perreault
- John Buzzard
- Report Details: 5 pages, 2 graphics
- Research Topic(s):
- Cybersecurity
- Fraud & Security
- PAID CONTENT
Overview
COVID-19 has triggered an international response that is unprecedented in terms of how enterprises engage during a pandemic. Until recently, such an event was largely a fictional exercise of documenting what might occur and business continuity impacts. The majority of U.S. businesses have not tested an all-encompassing pandemic action plan beyond the creation of documents that serve as checkboxes for compliance. The overarching response to preventing the spread of coronavirus through self-quarantine has now propelled the workplace into a rapid migration away from physical offices and work-related events. COVID-19 has triggered an international response that is unprecedented in terms of how enterprises engage during a pandemic. Until recently, such an event was largely a fictional exercise of documenting what might occur and business continuity impacts. The majority of U.S. businesses have not tested an all-encompassing pandemic action plan beyond the creation of documents that serve as checkboxes for compliance. The overarching response to preventing the spread of coronavirus through self-quarantine has now propelled the workplace into a rapid migration away from physical offices and work-related events.
Book a Meeting with the Author
Related content
2025 Dark Web Threat Intelligence Vendor Scorecard
Javelin’s newest cybersecurity scorecard, the 2025 Dark Web Threat Intelligence Vendor Scorecard, evaluates leading dark web threat intelligence vendors on the market today. This i...
2026 Cybersecurity Trends
In the year ahead, financial services will face several trending challenges as they try to keep organizations and customers safe. Zero trust will come to the forefront of supply ch...
Social Signals, Malicious Motives: Emojis as a Cyber Weapon
Cybercriminals leverage emojis to evade defenses and use them in phishing and spoofing attacks to deceive victims and steal sensitive information. Emojis are also used to control c...
Make informed decisions in a digital financial world