home_banner

This content is available to the public and does not require IANS login credentials. Questions? Reach out to us at ians@iansresearch.com.

Content Icon

COVID-19 and InfoSec: What You Need to Know

April 9, 2020 | Topic Guides | Security Policies and Strategy

Download PDF
COVID-19 and InfoSec: What You Need to Know

The ramifications of the novel coronavirus – COVID-19 – are being felt throughout the business and information security communities. Here we offer a compilation of the latest IANS research to help you stay ahead of this fast-evolving situation and keep your staff and businesses safe and productive.

What to communicate to executive management:

  • Executive Communications Briefing: Update on Coronavirus Business Continuity Strategies

    March 13, 2020 | Executive Communications | Business Continuity and Disaster Recovery (BCDR) | By Jake Williams, IANS Faculty

    Much has changed since our coronavirus Exec Comms Briefing webcast two weeks ago (see below). Confirmed U.S. cases have reached 1,000+, most companies are now encouraging employees to work from home and large banks are segmenting staff in different locations to guard against potential infections. Here's an update on the coronavirus pandemic from a business continuity perspective.

  • Executive Communications Briefing: Coronavirus as a Security/Risk Management Issue

    February 26, 2020 | Executive Communications | Risk Management | By Mark Clancy, IANS Faculty

    The spread of the coronavirus across Asia and Europe has already caused supply-chain and travel disruptions. Here we address the specific infosec and risk management issues teams are contending with right now.

Keeping remote workers productive and secure:

  • Collaboration Tool Security Checklist

    April 9, 2020 | Tools & Templates | Business Productivity

    This checklist provides security settings for Zoom, Microsoft Teams, GoToMeeting, Cisco Webex, Slack and Google Meets (aka Hangouts). Some settings are based on policy vs. security risk, but they are worth evaluating.
  • COVID-19: Restrict Access to Keep MSSPs in Line

    March 27, 2020 | Ask-An-Expert Writeups | Managed Security Services | By Josh More, IANS Faculty

    The COVID-19 pandemic is forcing all businesses to become more dependent on remote work, and managed security services providers (MSSPs) are no exception. Here we offer several options for ensuring your MSSP's remote workers don't overstep their privileges or access.
  • Harden VPN, Video and IM Against Attacks Exploiting COVID-19

    March 26, 2020 | Ask-An-Expert Writeups | Virtual Private Networks | By John Korpal, IANS Faculty

    As companies shift to remote work amid COVID-19, attackers could exploit the situation to leave companies dead in the water by targeting the very tools that allow them to function. Here are some tips for keeping your VPN, audio/video conferencing and messaging tools up and running – and secure.
  • COVID-19 Phishing Examples and Guidance (Updated)

    March 31, 2020 | Ask-An-Expert Writeups | Security Awareness, Phishing, Social Engineering | By Jake Williams, IANS Faculty

    Attackers are using COVID-19 as a phishing lure via email, SMS, mobile apps and even social media.. Here we detail what to watch for and how best to protect employees.
  • COVID-19 and the Cloud: Enabling Remote Work and Business as Usual

    March 11, 2020 | Faculty Reports | Business Continuity and Disaster Recovery (BCDR) | By Josh More, IANS Faculty

    As the novel coronavirus continues to spread, more organizations are re-evaluating their remote work capabilities. Here we highlight key issues and explain how focusing on upfront planning around network and cloud services can ensure your business stays secure and up and running through the crisis.

Shoring up likely attack vectors:

  • Indicators of Compromise: Identify the Latest COVID-19 Attacks

    March 20, 2020 | Ask-An-Expert Writeups | Malware and Advanced Threats | By Ken Pyle

    Attackers are poised to take advantage of the confusion and uncertainty surrounding the COVID-19 pandemic. Here we detail what organizations should watch for and recommend some key defenses to put in place.
  • Poll: Likely COVID-19-Themed Attack Vectors

    March 17, 2020 | Ask-An-Expert Writeups | Malware and Advanced Threats | By IANS Faculty

    Organizations are increasingly worried about attackers taking advantage of the uncertainty surrounding the COVID-19 pandemic. Here, IANS Faculty detail what they see as the COVID-19-themed attack vectors most likely to be exploited.

Getting comprehensive disaster planning and recovery plans in place:

  • COVID-19: Address the Next Black Swan in Your BCP

    April 6, 2020 | Ask-An-Expert Writeups | Business Continuity and Disaster Recovery (BCDR) | By George Gerchow, IANS Faculty
    The realities of COVID-19 have exposed the glaring gaps in even the best business continuity plans (BCPs). We detail some lessons learned that must be folded into today's BCPs so we can better address similar challenges in the future.     

  • Black Swan Business Continuity Checklist

    April 6, 2020 | Tools & Templates | Business Continuity and Disaster Recovery (BCDR)

    The realities of COVID-19 have exposed the glaring gaps in even the best business continuity plans (BCPs). This checklist is designed to ensure your organization isn’t left flat-footed whatever may come in the future.
  • Pandemic Impact Analysis Template

    March 9, 2020 | Tools & Templates | Business Continuity and Disaster Recovery (BCDR)

    This template can be used to help the business identify and prioritize critical roles, procedures and assets that must be considered and put in place during a pandemic event.

  • Business Continuity and the Coronavirus: Know Where to Focus

    March 2, 2020 | Ask-An-Expert Writeups | Business Continuity and Disaster Recovery (BCDR) | By Michael Pinch, IANS Faculty
    Uncertainty continues to swirl around the COVID-19 virus and its short- and long-term business impacts, a situation that makes business continuity planning (BCP) especially difficult. Here we detail a list of potential threats to consider, along with concrete mitigations and contingency plans.     

 

Preparing for the post-COVID-19 world:

 

Questions? Reach out to us at ians@iansresearch.com.


Related Research

M&A: Overview of How Cybersecurity Impacts Deals

Nearly half of M&A professionals say the discovery of a previously undisclosed data breach would derail a deal. Another 77% make M&A recommendations based on the strength of cybersecurity programs, and 95% consider cybersecurity programs a tangible asset.

Privileged Access Policy and User Agreement Template

This template is for a typical privileged access policy and user agreement. It includes key advice and recommendations for writing a comprehensive policy.