{"id":6999,"date":"2020-03-26T11:40:09","date_gmt":"2020-03-26T09:40:09","guid":{"rendered":"https:\/\/greatpeopleinside.com\/?p=6999"},"modified":"2020-03-26T11:40:11","modified_gmt":"2020-03-26T09:40:11","slug":"cybersecurity-during-the-coronavirus-pandemic","status":"publish","type":"post","link":"https:\/\/greatpeopleinside.com\/fi\/cybersecurity-during-the-coronavirus-pandemic\/","title":{"rendered":"Cybersecurity during the Coronavirus Pandemic"},"content":{"rendered":"\n<p> While the world\u2019s focus is obviously on the pandemic situation created by Covid-19, unethical hackers all around the world are more than happy to exploit this crisis by launching cybernetic attacks.\u00a0Those who can, are encouraged to work remotely if they are not doing so already. It seems that organisations will have to prepare themselves for life without an on-site staff or just a few in order to facilitate support functions. <\/p>\n\n\n\n<p>For example, Check Point, a cybersecurity company, has discovered that in the month of January 2020 alone there have been over 4000 coronavirus websites that are up and running with 3% of them being recognised as malicious and with another 5% suspicious. The British have responded to 658 cyber-attacks in 2019 and have also taken down over 177000 \u201cphishing\u201d sites. On the other hand, companies have started acquiring new laptops without doing their due diligence in terms of cybersecurity protocols, ironically leaving organisations even more vulnerable to attacks. <\/p>\n\n\n\n<p>Given the current state of affairs, the US Health &amp; Human Services Department\u2019s system has been breached, an attack that had the sole purpose of disrupting and misinforming people in order to reduce the efforts being made in responding to the Covid-19 pandemic. John Ullyot, a spokesperson from the National Security Council had this to say about the cyber-attack: \u201cWe are aware of a cyber incident related to the Health and Human Services computer networks, and the federal government is investigating this incident thoroughly. HHS and federal government cybersecurity professionals are continuously monitoring and taking appropriate actions to secure our federal networks.\u201d The HHS delegated spokeswoman had this to say in regards to the situation that enfolded: \u201cOn Sunday, we became aware of a significant increase in activity on HHS cyber infrastructure and are fully operational as we actively investigate the matter,\u201d said the spokeswoman, Caitlin Oakley. \u201cWe are coordinating with federal law enforcement and remain vigilant and focused on ensuring the integrity of our IT infrastructure.\u201d <\/p>\n\n\n\n<p>Given that sheer impact and reorganisation that has ensued following the declaration of the pandemic, employee and employers alike must be really careful when handling confidential information. Below you will find a list of tips of what companies can do to minimise risk in these difficult times. <\/p>\n\n\n\n<h2><strong>For the Employees<\/strong><\/h2>\n\n\n\n<p><strong>1. Be Extra Careful with Phishing Emails<\/strong><\/p>\n\n\n\n<p>Cyber attackers thrive in a crisis.\u00a0Pay close attention to emails designed to make you instantly click on special offers for whatever protective gear or products related to the coronavirus pandemic. Or it could be an email from your manager with an apparently innocent link in it which will make you download dangerous malware on the company\u2019s laptop, a laptop that has direct access into the company\u2019s overall system. \u00a0There has been a considerable rise in Office 365 and Gmail hacked accounts, with the cyber attacker sending invoices to clients of partners alike. <\/p>\n\n\n\n<p>In order to stay safe, it is recommended to enable the multi-factor authentication on all the accounts you can. This simple action will obstruct almost all attackers, excluding the really great ones. <\/p>\n\n\n\n<p><strong>2. Cyber Hygiene is almost as important as Washing our Hands<\/strong><\/p>\n\n\n\n<p>All devices you use, and this includes the router as well, should be up to date with the latest version of anti-virus and the internet you use must come from a secure and reliable connection. Bluetooth use in public areas should be avoided at all costs. That is an easy way for hackers to connect to your device. The importance of multi-factor authentication cannot be more underlined. <\/p>\n\n\n\n<p><strong>3. WiFi Exclusively from Secure Locations<\/strong><\/p>\n\n\n\n<p>Work exclusively from password-protected internet connections. If you have no other choice and you have to use a public WiFi it is imperative you check with the owner of the establishment that the network you wish to connect to is the correct one. Also, avoid accessing confidential and sensitive information from a public WiFi network. It is easy for hackers to trick people into joining an internet network which basically gives him access to everything you see and do on the internet. <\/p>\n\n\n\n<h2><strong>For the Employers<\/strong><\/h2>\n\n\n\n<p><strong>1. Set Up Remote Access ASAP<\/strong><\/p>\n\n\n\n<p>Do not let your employees go home without the program installed and their login credentials by their side. Handing out authentication credentials to remote workers with no prior training and explanations is going to be an extremely difficult and frustrating process.\u00a0 <\/p>\n\n\n\n<p><strong>2. Confidential Information handled with Extra Care<\/strong><\/p>\n\n\n\n<p>Remind your employees that confidential information is more important than ever and must be handled accordingly. Personal emails are definitely off-limits and employees should be careful with what they print out at home. If a particular document would normally be shredded at the office, remind your employees to dispose of it safely in their homes, or simply put the brakes on printing anything in the first place. <\/p>\n\n\n\n<p><strong>3. No Personal Laptops for Work<\/strong><\/p>\n\n\n\n<p>Employees must be given company laptops and training by IT security personnel in how to use the laptops they are given to work from home. Personal computers or laptops should be forbidden due to the simple fact that it creates numerous problems in terms of preserving and safeguarding documents. There is also the issue of out of date software used and that could compromise a lot more than just documents. <\/p>\n\n\n\n<p><strong>4. Up to Date Contact Information<\/strong><\/p>\n\n\n\n<p>Be sure your organisation has a secure way of contacting all employees \u2014 whether we\u2019re talking here about the personal cell phone number or a landline.\u00a0That way, if the organisation falls victim to a cyber-attack of any kind, you\u2019ll be able to communicate effectively. For key members of the senior management, set up a group on a secure texting application such as Whatsapp or Telegram in case all other systems are down in order to properly communicate in case of a serious cyber-attack. <\/p>\n\n\n\n<p>Remote access tools have advanced in unbelievable ways that were inconceivable 10 years ago, given the fact that it made en masse remote work possible. As with all data security, remote access is only as strong as its weakest link. There has to be a strong combination of technology and employee know-how and training, it can be done safely and smartly. Stay safe and be careful out there.<\/p>\n\n\n\n<h2><strong>How can Great People Inside help you assess your \u2018remote working\u2019 workforce?<\/strong><\/h2>\n\n\n\n<p> Given our current situation knowing that your colleagues or employees  are best suited for this new scenario we find ourselves in. Finding the  right talent, the best fit for the job and your organisation can be a  very challenging task. It is now important to find out whether your  managers or your team is well-equipped of working together from various  locations. It requires deep knowledge of their personalities, strengths,  weaknesses, interests, work style and other characteristics. Our  technology and solutions will do the work for you, helping you discover  if your people are resilient during times of hardship, if they are  autonomous, if they are team players, without actual human contact.  Given that our platform is cloud-based, everyone can use it from home as  well. Humanity finds itself at a crossroad for various reasons now, why  not help people discover and develop themselves from the comfort of  their own homes?  <\/p>\n\n\n\n<p>Request a\u00a0free demo:      <\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/greatpeopleinside.com\/free-demo\/\"><img src=\"http:\/\/greatpeopleinside.com\/wp-content\/uploads\/2016\/04\/B_txt_14.png\" alt=\"B_txt_14\"\/><\/a><\/figure>\n\n\n\n<p>Sources: <\/p>\n\n\n\n<p><em>https:\/\/www.nytimes.com\/2020\/03\/16\/us\/politics\/coronavirus-cyber.html      <br>https:\/\/www.bloomberg.com\/news\/articles\/2020-03-16\/u-s-health-agency-suffers-cyber-attack-during-covid-19-response<br>https:\/\/www.ft.com\/content\/cbe2b35a-66d2-11ea-a3c9-1fe6fedcca75   <\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>While the world\u2019s focus is obviously on the pandemic situation created by Covid-19, unethical hackers all around the world are more than happy to exploit this crisis by launching cybernetic attacks.\u00a0Those who can, are encouraged to work remotely if they are not doing so already. It seems that organisations will have to prepare themselves for [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7001,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[133],"tags":[96,252,253,89,94,191,95,64,69,39,106,80,82],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v15.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity during the Coronavirus Pandemic - Great People Inside<\/title>\n<meta name=\"description\" content=\"Unethical hackers all around the world are more than happy to exploit the Covid-19 crisis by launching attacks on various cybersecurity networks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/greatpeopleinside.com\/cybersecurity-during-the-coronavirus-pandemic\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity during the Coronavirus Pandemic - Great People Inside\" \/>\n<meta property=\"og:description\" content=\"Unethical hackers all around the world are more than happy to exploit the Covid-19 crisis by launching attacks on various cybersecurity networks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/greatpeopleinside.com\/cybersecurity-during-the-coronavirus-pandemic\/\" \/>\n<meta property=\"og:site_name\" content=\"Great People Inside Finland\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/GreatPeopleInside\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-26T09:40:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-03-26T09:40:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/greatpeopleinside.com\/fi\/wp-content\/uploads\/2020\/03\/cyber-security.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1030\" \/>\n\t<meta property=\"og:image:height\" content=\"557\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\">\n\t<meta name=\"twitter:data1\" content=\"great people inside\">\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data2\" content=\"5 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/greatpeopleinside.com\/fi\/#organization\",\"name\":\"Great People Inside\",\"url\":\"https:\/\/greatpeopleinside.com\/fi\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/GreatPeopleInside\/\",\"https:\/\/www.linkedin.com\/company\/great-people-inside\",\"https:\/\/www.youtube.com\/channel\/UCl7ZmOYj1DTHUUA8sa0idLg\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/greatpeopleinside.com\/fi\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/greatpeopleinside.com\/fi\/wp-content\/uploads\/2016\/10\/logo-GPI_02.png\",\"width\":224,\"height\":108,\"caption\":\"Great People Inside\"},\"image\":{\"@id\":\"https:\/\/greatpeopleinside.com\/fi\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/greatpeopleinside.com\/fi\/#website\",\"url\":\"https:\/\/greatpeopleinside.com\/fi\/\",\"name\":\"Great People Inside Finland\",\"description\":\"T\\u00e4ysin muokattavissa oleva arviointi - ja kehitysalusta\",\"publisher\":{\"@id\":\"https:\/\/greatpeopleinside.com\/fi\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/greatpeopleinside.com\/fi\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/greatpeopleinside.com\/cybersecurity-during-the-coronavirus-pandemic\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/greatpeopleinside.com\/fi\/wp-content\/uploads\/2020\/03\/cyber-security.jpeg\",\"width\":1030,\"height\":557,\"caption\":\"cyber security Great People Inside\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/greatpeopleinside.com\/cybersecurity-during-the-coronavirus-pandemic\/#webpage\",\"url\":\"https:\/\/greatpeopleinside.com\/cybersecurity-during-the-coronavirus-pandemic\/\",\"name\":\"Cybersecurity during the Coronavirus Pandemic - Great People Inside\",\"isPartOf\":{\"@id\":\"https:\/\/greatpeopleinside.com\/fi\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/greatpeopleinside.com\/cybersecurity-during-the-coronavirus-pandemic\/#primaryimage\"},\"datePublished\":\"2020-03-26T09:40:09+00:00\",\"dateModified\":\"2020-03-26T09:40:11+00:00\",\"description\":\"Unethical hackers all around the world are more than happy to exploit the Covid-19 crisis by launching attacks on various cybersecurity networks.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/greatpeopleinside.com\/cybersecurity-during-the-coronavirus-pandemic\/\"]}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/greatpeopleinside.com\/cybersecurity-during-the-coronavirus-pandemic\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/greatpeopleinside.com\/cybersecurity-during-the-coronavirus-pandemic\/#webpage\"},\"author\":{\"@id\":\"https:\/\/greatpeopleinside.com\/fi\/#\/schema\/person\/6471561e9a7721590a04f32f82dc4869\"},\"headline\":\"Cybersecurity during the Coronavirus Pandemic\",\"datePublished\":\"2020-03-26T09:40:09+00:00\",\"dateModified\":\"2020-03-26T09:40:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/greatpeopleinside.com\/cybersecurity-during-the-coronavirus-pandemic\/#webpage\"},\"publisher\":{\"@id\":\"https:\/\/greatpeopleinside.com\/fi\/#organization\"},\"image\":{\"@id\":\"https:\/\/greatpeopleinside.com\/cybersecurity-during-the-coronavirus-pandemic\/#primaryimage\"},\"keywords\":\"Behaviour assessment,coronavirus,Covid-19,Customised Assessment,Fully customisable assessment and development platform,GR8,GR8PI,Great People Inside,HR,Human Resources,psychometric assessments,Scientifically Validated Assessment.,Workforce Assesssments\",\"articleSection\":\"P\\u00e4\\u00e4t\\u00f6ksenteko\",\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/greatpeopleinside.com\/fi\/#\/schema\/person\/6471561e9a7721590a04f32f82dc4869\",\"name\":\"great people inside\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/greatpeopleinside.com\/fi\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2acac3ea5d9122beb671c62c07265e37?s=96&d=mm&r=g\",\"caption\":\"great people inside\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/greatpeopleinside.com\/fi\/wp-json\/wp\/v2\/posts\/6999"}],"collection":[{"href":"https:\/\/greatpeopleinside.com\/fi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/greatpeopleinside.com\/fi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/greatpeopleinside.com\/fi\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/greatpeopleinside.com\/fi\/wp-json\/wp\/v2\/comments?post=6999"}],"version-history":[{"count":3,"href":"https:\/\/greatpeopleinside.com\/fi\/wp-json\/wp\/v2\/posts\/6999\/revisions"}],"predecessor-version":[{"id":7005,"href":"https:\/\/greatpeopleinside.com\/fi\/wp-json\/wp\/v2\/posts\/6999\/revisions\/7005"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/greatpeopleinside.com\/fi\/wp-json\/wp\/v2\/media\/7001"}],"wp:attachment":[{"href":"https:\/\/greatpeopleinside.com\/fi\/wp-json\/wp\/v2\/media?parent=6999"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/greatpeopleinside.com\/fi\/wp-json\/wp\/v2\/categories?post=6999"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/greatpeopleinside.com\/fi\/wp-json\/wp\/v2\/tags?post=6999"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}