Six practical tips for practicing cyberhygiene in the middle of a global pandemic

Kimberly Peretti, Amy Mushahwar, Jon Knight
{"title":"Six practical tips for practicing cyberhygiene in the middle of a global pandemic","authors":"Kimberly Peretti, Amy Mushahwar, Jon Knight","doi":"10.1108/joic-08-2020-0017","DOIUrl":null,"url":null,"abstract":"\nPurpose\nDiscusses the long-term cybersecurity challenges businesses face as COVID-19 cases spike and remote work environments need to remain operational, scalable, and capable of flexing with cycles of virus resurgence.\n\n\nDesign/Methodology/Approach\nDiscusses the target-rich environment cybercriminals have during this time, and steps businesses should take to secure their environments and raise employee awareness as more devices are being used remotely for company business and more company data is being sent, located, or stored outside the protections of the company infrastructure.\n\n\nFindings\nThe remote work environment is likely to be around for the foreseeable future and businesses need to ensure they are secured for long-term success.\n\n\nPractical implications\nThe authors offer information security and IT teams practical ways businesses can keep their systems secure and functioning: (1) Consider Basic Cyberhygiene; (2) Identify Security Blind Spots; (3) Review and Update Business Continuity, Disaster Recovery, and Incident Response Plans; (4) Remain Vigilant for Scams and Phishing Attacks; (5) Be Aware of Applicable Industry-Specific Guidelines; (6) Revisit Risk Exceptions.\n\n\nOriginality/Value\nPractical guidance from experienced data privacy and cybersecurity lawyers in response to COVD-19 for Information Security, IT, and business management teams.\n","PeriodicalId":399186,"journal":{"name":"Journal of Investment Compliance","volume":"7 5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Investment Compliance","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1108/joic-08-2020-0017","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Purpose Discusses the long-term cybersecurity challenges businesses face as COVID-19 cases spike and remote work environments need to remain operational, scalable, and capable of flexing with cycles of virus resurgence. Design/Methodology/Approach Discusses the target-rich environment cybercriminals have during this time, and steps businesses should take to secure their environments and raise employee awareness as more devices are being used remotely for company business and more company data is being sent, located, or stored outside the protections of the company infrastructure. Findings The remote work environment is likely to be around for the foreseeable future and businesses need to ensure they are secured for long-term success. Practical implications The authors offer information security and IT teams practical ways businesses can keep their systems secure and functioning: (1) Consider Basic Cyberhygiene; (2) Identify Security Blind Spots; (3) Review and Update Business Continuity, Disaster Recovery, and Incident Response Plans; (4) Remain Vigilant for Scams and Phishing Attacks; (5) Be Aware of Applicable Industry-Specific Guidelines; (6) Revisit Risk Exceptions. Originality/Value Practical guidance from experienced data privacy and cybersecurity lawyers in response to COVD-19 for Information Security, IT, and business management teams.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
在全球大流行期间练习网络卫生的六个实用技巧
目的讨论企业面临的长期网络安全挑战,因为COVID-19病例激增,远程工作环境需要保持可操作性、可扩展性,并能够随病毒复发周期而灵活应变。设计/方法/方法讨论了在此期间网络犯罪分子所处的目标丰富的环境,以及随着越来越多的设备被远程用于公司业务,越来越多的公司数据被发送、定位或存储在公司基础设施保护之外,企业应该采取哪些措施来保护环境并提高员工的意识。在可预见的未来,远程工作环境很可能会存在,企业需要确保远程工作环境能够获得长期成功。实际意义作者为信息安全和IT团队提供了企业保持系统安全和功能的实用方法:(1)考虑基本网络卫生;(2)识别安全盲点;(3)审查和更新业务连续性、灾难恢复和事件响应计划;(4)警惕诈骗和网络钓鱼攻击;(5)了解适用的行业特定指南;(6)重新审视风险例外。创意/价值经验丰富的数据隐私和网络安全律师为信息安全、IT和业务管理团队应对covid -19提供实用指导。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
ESG litigation – how companies can get ready, respond and resolve claims Strengthening AML/CFT controls of digital payment token service providers in Singapore Understanding regulatory trends: digital assets & anti-Money laundering “Racing” to the IBOR transition finish line Structuring and financing private equity and venture capital transactions in Luxembourg
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1