CYBER SECURITY TO FLOURISH POST- PANDEMIC
The author of this news feed is Vishakha Pandey, lawyer and Kamla Nehru Institute of Physical and social sciences ( law faculty), Sultanpur.
Cyber Security to flourish Post- Pandemic
The ongoing worldwide outbreak of coronavirus
disease (COVID-19), which originated in Wuhan, China, in December 2019,
continues to grab headlines. As of mid-February 2020, more than 70,000 cases
had been confirmed. The World Health Organisation (WHO) has declared the
outbreak a public health emergency of international concern, and health
authorities continue to work to contain the spread of the disease.
With the growing health problems globally,
quarantine is practiced in several countries. Because of which “Work from Home”
is under prevalence which is leading to cybercrime in the IT- sector. To
contain novel coronavirus, the lockdown has been declared and since everyone is
at home therefore, the use of social media is inclined. This increased
interconnectedness heightens the risk of a Cyber Crime.
The National Cyber Security Agency recorded an
increase in the number of cyberattacks on personal computer networks and
routers since professionals were asked to work from home in the wake of the
COVID-19 outbreak in the country. The Computer Emergency Response Team of India
(CERT-In) elucidates that with the outbreak of COVID-19 cybercriminals are
exploiting and took it as an opportunity to send phishing emails claiming to
have important updates or encouraging donations, impersonating trustworthy
organizations.
According to the study recorded by,
PricewaterhouseCoopers’ the number of Cyberattacks on Indian Companies has
doubled, as cybercriminals use the disruption brought about by the COVID-19
outbreak to infiltrate corporate networks and steal data team. The PWC analyst
observed several attempts of delivering malicious payloads including those
related to the COVID- 19 theme. The major threat vector in India was AZORult – malware designed to steal information including credentials. This malware has
been in existence over three years but was recently linked with malicious files
and apps belonging to the COVID-19 theme.
The CERT put forward countermeasure and best
security practices in this context which is as elucidated in the following manner:
-
• To
Change default passwords of your home Wi-Fi router to prevent hackers from
accessing your network.
• Use
strong and unique passwords on every account and device and use two- factor
authentication (2FA).
• It
suggests not allowing sharing of work computers and other devices. When
employees bring work devices home, those devices should not be shared with or
used by anyone else in the home. This reduces the risk of unauthorized access
to protect company information.
• It
urges to use only company software to share files and refrain from using your
email or 3rd part services unless reliably informed.
• The
advisory recommended that remote uses activity is also covered by the
organization’s perimeter and also ensures that the remote sessions
automatically time out after the specified period of inactivity and that they
require re-authentication to gain access.
• It
gave a specific suggestion for IT teams to “consider Mobile Device Management
(MAM) and Mobile Application Management (MAM)”. These tools can allow
organizations to remotely implement a number of security measures, including
data encryption, malware scans and wiping data on stolen devices.
In order to fortify the conundrum of cybercrimes
during and post lockdown it is crucial to access any cyber data vigilantly to
combat cyber attacking like Phishing and hacking and is also mandated to
fortify the security of the country’s internet domain.
REFERENCES
• https://www.csoonline.com/article/3528878/a-security-guide-for-pandemic-planning-7-key-steps.html
• https://economictimes.indiatimes.com/tech/internet/covid-19-cert-in-says-spurt-in-cyberattacks-on-personal-comps-since-work-from-home-protocol-began/articleshow/74849119.cms?from=mdr
• https://economictimes.indiatimes.com/tech/internet/hackers-are-using-covid-19-disruption-to-infiltrate-corporate-networks/articleshow/74837213.cms
• https://www.crowdstrike.com/blog/on-demand-webcast-crowdstrike-experts-on-covid-19-cybersecurity-challenges-and-recommendations/
Comments
Post a Comment