Extend Your Security Team, Quickly Add Expertise and Help Secure Your Remote Workforce

Extend Your Security Team, Quickly Add Expertise and Help Secure Your Remote Workforce

Organizations around the world are adapting to respond to the impact of the novel coronavirus (COVID-19). Companies may experience increased stress and challenges across their security programs arising from increased remote user demand, site availability impacts, stringent travel restrictions and requests for social distancing. Security organizations may also urgently need to deploy critical software and infrastructure to help support and secure a remote workforce or fulfill business priorities.


Sadly, but not unexpectedly, threat actors are attempting to take advantage of this crisis and their ability to exploit the expanded attack surface that an increased remote workforce introduces, and to exploit less-savvy workers with new phishing and malware campaigns masquerading as coronavirus news, tools and heat maps. All of these factors may result in additional pressure on already strained security teams to handle increased alert monitoring, investigations and incidents.


At IBM Security, we understand that corporations and institutions around the world count on us to help during challenging times like these. That is why we want to offer this practical advice and assistance.


Limit Your Attack Surface as Virtual Work Increases


Given recommendations for employees to work from home, virtual and digital interaction is increasing an organization’s network activity and the number of connected devices on those networks. Some employees could be using personal and family-shared computers, tablets and mobile devices, increasing security risks. With remote work, employees are frequently outside on-premises protections such as content filtering, intrusion prevention and even basic firewalls. Employees who do not traditionally work from home can be more vulnerable because of the unfamiliar work environment and therefore more susceptible to phishing attacks and scams. Additionally, threat actors are attempting to attack organizations ..

Support the originator by clicking the read the rest link below.