It seems like about 15 years ago that we were shutting down for “15 days to slow the spread.” In reality, we’re coming onto the better part of a year – and it seems like we may be seeing a light at the end of this seemingly endless tunnel.

Like in any world-changing event, we’re entering a new normal. Our economy and our approach to work — and therefore, cybersecurity — has fundamentally changed. Even as laws loosen up and employees are open to going back to the office, they’re sticking to their work-from-home setups.

The Data Connectors team is already looking at the future, to the next possible pandemic… but this one won’t be battled with hand sanitizers and face masks. The next pandemic may be targeting our online infrastructure. As a community, it’s our job to prepare and ensure that we’re not setting ourselves up for some major trouble.

That’s why it’s no surprise that the prevalence of cyber attacks increased by 30% in March and April of this year. Cyber criminals are not letting up.

 

Preparing for What’s Next

{{cta(‘a867eb66-c074-4eb1-a816-78f1b8f77ac0’)}}

So how can we begin to protect ourselves? Your post-COVID to-do list is definitely long, but it’s 

manageable — and vital for avoiding the tremendous consequences of cyber crime. Our latest infographic offers three key lessons we can draw from COVID, including:

  1. A cyber attack could spread at 9 times the rate of COVID-19.
  2. The economic impact of a digital shutdown would be detrimental.
  3. Recovery from a major cyber attack could shut the economy down to a halt.

So what can you do to protect your tech? We’ve got tips for tightening up your virtual ship, featuring insights on email security, IoT, OT/IT alignment and cybersecurity for our work-from-home culture.
.

Leave a Reply

Your email address will not be published.

Recent news posts

This is a sample blog post title.
Featured Image

What the Crypto Crash Means for Cyber Crime

This is a sample blog post title.
Featured Image

Scaling, Improving and Automating Your GRC Strategy

This is a sample blog post title.
Featured Image

CISA Issues Emergency Directive 22-03, Encourages VMware Updates

This is a sample blog post title.
Featured Image

Cyber Fraud Task Force: Weekly News Update

This is a sample blog post title.
Featured Image

Cloud Computing, Data Protection Top List of In-Demand Skills: ISACA Annual Report

Attend an Event!

Connect and collaborate with fellow security innovators at our Virtual Cybersecurity Summits.

Register Today