Remote working: How to ensure information security and IT continuity during COVID-19

2020-04-07

Remote working: How to ensure information security and IT continuity during COVID-19

The unscheduled and immediate mass transition to remote working as a result of COVID-19 has created new IT continuity and security challenges for organizations. Beyond the business uncertainties and rise in disinformation activities related to Coronavirus, new Information Security measures need to be taken by organizations to protect themselves against cybercriminals exploiting the new norms of remote working.

We spoke to one of 4C Strategies’ IT security experts, Christoffer Karsberg and CIO, Johan Wurtz, to find out more about Coronavirus-related cybercrime as well as the best practices, recommendations and “if all else fails” advice being provided to 4C Strategies staff and clients.

Phishing is on the increase

“These are challenging times for anybody responsible for information security and at an organization. What was already a difficult job has been amplified as criminals exploit the current situation on multiple levels,” says Karsberg. “More people working from home without the protection of corporate firewalls, for instance, has led to a dramatic increase in phishing emails – many of them playing on the insecurities we all face in light of the Coronavirus.”

“To reduce the risk, you should be on your guard if you receive mails from governmental bodies sharing links and downloads to `vital´ information, or from specialists offering advice on how to cure COVID-19. Employees of larger organizations are also being targeted with fake internal Coronavirus-related mails, so make sure to check sender addresses and content. Even it appears to be sent internally, if it doesn’t sound like it’s from your company, report it. Above all, don’t download anything or share information if prompted in an email.”

Healthcare industry under attack

“Healthcare providers, drug manufacturers and even organizations like the World Health Organization have all reported an increase in cyber-attacks,” says Wurtz. “If they weren’t busy enough fighting the Coronavirus, they also have to fight cybercrime. Some hospitals and medical research institutes around Europe have reported ransomware demands that have led to patient data being leaked and operations being cancelled. Furthermore, several hospitals in European epicenters of pandemic have warned staff to avoid opening suspicious mails as criminals attempt to destabilize IT systems – not what healthcare workers need to think about right now.”

Remote IT security

For organizations that have had remote working thrust upon them, with little or no time to prepare, the situation right now can seem very daunting. Business continuity management has been top of mind with information security and IT-continuity being left to IT to ‘solve’, rather than being a strategic operations decision.

The difficultly of solving this challenge is compounded as organizations have no or little control over factors such as the reliability of staffs’ internet providers, their broadband connection speeds or the security of employees’ home Wi-Fi  configurations.

Broadband Infrastructure

“Many of our home markets has invested heavily in its broadband infrastructure, but there are still areas where users experience regular services interruptions,” continues Wurtz. “During peak times, such as on the hour when new meetings start-up and remote video meetings begin, bottlenecks  can occur. If you are lucky, this is the only time you experience reduced latency issues, if not, you can experience issues throughout a meeting. In countries that haven’t invested as much in their infrastructure, the problem is multiplied. This isn’t going to lead to a major incident, but it will result in inefficiencies.”

“Networks can also be impacted if providers are prioritizing network capacity and resources to hospitals, emergency services and government agencies. And, if your entire neighbourhood is streaming films simultaneously, you may also encounter low latency.”

Thank you for downloading!
The resource will be sent to the given email address. You are welcome to contact us with any question you may have.

To learn more about how 4C Strategies process data, please read our privacy statement.

I agree to be contacted for the purpose indicated above, and to receive information about 4C Strategies’ products, services and events.

Download resource

Securely managing data

“Securely connecting to an office network from a remote connection requires a VPN,” continues Karsberg. “If you don’t have a common VPN solution in place yet, it has to be highest priority for those accessing sensitive data. However, there is obviously a cost involved in doing this that may not have been budgeted for. Not a problem if 50 people need a VPN to access data, but if it’s 10,000 it’s a different story. In such a case you may want to assess who can access sensitive data for the coming months and the impact of limiting access. ”

“Such decisions need to be taken quickly to safeguard operations, which, for some organizations, means elevating information security and IT continuity and making them part of overall business continuity plans.”

Personnel dependency planning

Implementing these IT security measures assumes that IT personnel do not have to take leave of absence, through ill health, childcare or any other reason. As this scenario is likely to become a reality for organizations across the globe, a Business Impact Analysis should be carried out, looking potential consequences using different variables, e.g. 20- 40 percent absence of staff in the short and long-term (2 weeks/6 weeks).  This should enable organizations to identify the minimum levels of staffing needed to maintain critical activity service levels.

Regarding absence of key IT personnel, such as the CTO/CIO, it’s essential to examine whether dependencies are full or partial, i.e., does a single person or a few individuals have a specific competence? If not already done as part of the assessment, organizations should examine the consequences of the absence of each key individual from a short-term and long-term perspective.

Service continuity plans should be developed, which include assessing if staff can be moved within the organisation and if the competencies of key personnel can be transferred to other employees. If not, arrangements with staffing agencies should be reviewed. Much more information on staff continuity can be found in 4C’s article on critical dependencies during COVID-19.

COVID-19 support

We hope these resources will be helpful to you and your organization. 4C Strategies is ready to assist with any queries or specific needs as the situation evolves. Continue below for an overview of our COVID-19 support and 4C’s collection of publicly available resources for the pandemic response.

Message sent

Your message is being processed successfully! We will be back to you at our soonest opportunity.

Thank you!

You are now registered.

Download pack

Photo credits

License

Choose size
  • Original image
  • Large image (2900px)
  • Medium image (1920px)
  • Small image (1024px)
DOWNLOAD