Many organizations woke up to the importance of cybersecurity when the COVID-19 pandemic struck and shone a harsh light on the state of cybersecurity. The new constellation of home offices on personal networks and devices created more targets for cybercriminals globally.
There were new security threats, and organizations were not fully prepared to tackle these. The number of cybersecurity risks facing organizations rose in the far more digitally connected and vulnerable landscape. Thus, shot up the demand for cybersecurity solutions.
We believe that there is no going back to the old ways in the post-pandemic world. Will the importance of cybersecurity change further in the new normal? Let us delve deep into this question:
In the pre-COVID-19 era, a vast majority of employees worked from the physical office premises. It was easier to secure the LAN and devices used in the physical offices. Using sophisticated technology and cybersecurity solutions, IT security teams avert major security crises and keep tight control on activities.
The pandemic struck. Organizations of all kinds shifted into a fully remote working model for business continuity in the face of a country-wide lockdown. The workforce is communicating, connecting to business networks, and accessing resources remotely over vulnerable and even, shared network connections and devices.
There has been an increase in the adoption of cloud-based infrastructure and applications, and online collaborative tools.
Moving forward, we believe that some of the features of the pandemic-time work will follow into the new ‘normal’ in the post-pandemic world. For instance, greater use of cloud-based infrastructure, institutionalized remote working, e-learning/ m-learning, etc.
The importance of cybersecurity will continue to grow. COVID-19 is not the only disruption that we are going to face. Living in a VUCA world, we must be prepared for all disruptions in the future and their security implications. The importance of cybersecurity in the post-COVID-19 world is undeniable and highlights the need for cyber-resilience.
Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…
The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…
A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…
Meta has announced the removal of over 2 million accounts connected to malicious activities, including…
Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…
A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…