As the threat of the novel coronavirus (COVID-19) has resulted in delays, shutdowns, and disruptions in global supply chains, transportation, government, media, and finance, one of the most critical issues are arising cybersecurity threats and consequences.
Cybersecurity professionals are scrambling to understand how evolving events around COVID-19 will shape the threat landscape. Events such as WannaCry may have temporarily disabled technology services that were running with inadequate security. Still, the repercussions from the COVID-19 will affect every organization, no matter how secure they imagined they were. No single event to date has changed the technical threat landscape more than the consequences and impacts developing around COVID-19.
The list of issues includes:
Budget cuts resulting from COVID-19 expenses
Supply chain failures resulting from COVID-19
Disgruntled former staff (become rogue hackers)
Manipulation of news events
New cyberScams and Ransomware
Hardware shortages resulting from increased network traffic
Lack of Cybersecurity technicians to address new threats
Additionally, there are the business consequences, such as changes in consumer patterns and loss of income. COVID-19 falls outside of the outliers. It creates a situation known as the Medusa Effect (i.e., when we experience uncontrollable levels of risk coupled with supporting evidence). Despite the proliferation and advancement of risk assessment methodologies for Critical Information Infrastructures (CIIs), current frameworks do not adequately address COVID-19 and the cascading effects associated with security incidents occurring from interacting entities. Artificial intelligence (AI) software and IoT infrastructure can help to create an ecosystem where all things (devices and people) are connected /networked, rapidly providing real-time information to solve problems before they become disasters. Businesses are quickly creating BCP (“Business Continuity Plans”) to cover “what-if” scenarios that were unthinkable just a month ago. At the point when threats increase because of potential supplier failures, a wave of fresh cyber scams that leverage the virus will appear. See here.
Some simple advice follows:
Take the time to understand your business from a cybersecurity point of view. Security professionals and business continuity experts use business impact analysis (BIA) to help understand the products and services each organization provides and the dependencies (technical and otherwise) that they have.
Rapidly develop an updated, operable BCP that will allow the core of your organization to continue with little, if any, reliance on outside suppliers and technologies.
BCP’s, in turn, should integrate well with technical disaster recovery plans. Review those plans and change them where they are reliant on suppliers or services where interruptions could be foreseen to be more than remote.
The organizations that will survive will be the ones that focus on understanding how to isolate and insulate their core operations and services from the unforeseen and unknown events which are sure to continue.