SlideShare a Scribd company logo
1 of 7
Download to read offline
Working from Home?
Surge in Cyber Attacks
BE ALERT
Rasie your awareness!
Be Alert everyone: due to COVID-19, there’s a surge in employees working from home. This rapid
transition comes with its risks, which can only be mitigated once we understand and take
necessary actions to protect ourselves and our organization from the cyber infiltrators.
Indeed, the responsibility lies with the organization for providing necessary infrastructure & tools.
However, in current times, it is also the user's responsibility to stay alert and find ways to fight the
cyber attack on your organization.
The information shared in this presentation is both for the New Home Users and the IT Teams,
intended to raise awareness to protect against the rising cybercrimes on the back on COVID-19.
NEW TO WFH?
Raise your awareness
99% of ransomware attacks start from an email message. Don’t rush to click. Check before you
open the email OR click on the URL OR open that attachment. It could be malicious!
Call to verify: You may get a mail from your colleague or senior management asking to make
payment transfers or share confidential information. STOP!
Reach out via phone or over an online meeting to confirm the payment transfer request or sharing
of the confidential information. On a closer look, you may or may not be able to identify that the
request is coming from genuine sources. Search for Homoglyph attack.
Remember: if it seems suspicious, it probably is. Investigate further or take advice.
NEW TO WFH?
Raise your awareness
Wi-Fi: ensure your WI-FI is hidden and encrypted using WPA2. Check your router if it conforms
to the latest standard. Or use wired instead.
Personal Emails & Printers: Do not use personal emails or your home personal printers for your
work-related matters.
Collaboration: only use approved official collaboration tools, such as Microsoft Teams, Amazon
Chime, Go-to-Meeting, Skype for Business etc.
Alexa: ask Alexa or Google Home to stop listening. Turn it off or keep it away while having an
official conversation.
IT TEAMS
Ready Yet?
Are you using VDI yet? Virtual Desktop Infrastructure provides remote access to a virtual desktop,
hosted on a centralized server. With VDI, device level security becomes less important as all user
activities take place within the Virtual Machine.
Is your VPN safe? Virtual Private Network is very commonly used. Ensure it meets
your organization standards. Ensure your firewall can handle the massive traffic inflow.
How about MFA? Multi-Factor Authentication: Ensure it is enforced for all users & Apps.
Operating System: Have you installed the most updated OS, such as Windows 10?
Firewall: Do you have a robust firewal in place? Is it capable to stop uninvited guests from
browsing your network?
IT TEAMS
Ready Yet?
Email Security: do you have a robust email security in place, to protect against targeted threats?
Endpoint Security: Do you have the next-gen (AI/ ML) endpoint security to protect your remote
devices?
Brand Protect: What’s your plan to deal with malicious domains impersonating or replicating your
digital assets before they do damage to your brand? Are you prepared to protect your customers
and your partners  against attackers using your digital assets?
Backup: Have you communicated how & where should the user backup their business data?
Work from Home policy: finally, appreciate that its new for your office desktop users to work
from home. Not only do you need the right tools & policies deployed across enterprise but also
you need to provide user awareness training to keep them and the organization safe from
malicious attacks.
WORK WELL.
SAFELY.
H E A L T H I S W E A L T H
Prevent the spread of COVID-19
Maintain Social Distancing
WWW.ICDIGITAL.COM

More Related Content

What's hot

WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
WISE KIDS
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
R_Yanus
 

What's hot (18)

ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Covid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from officeCovid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from office
 
What is CryptoLocker and How Can I Protect My Business From It?
What is CryptoLocker and How Can I Protect My Business From It?What is CryptoLocker and How Can I Protect My Business From It?
What is CryptoLocker and How Can I Protect My Business From It?
 
Is your data on the cloud at risk?
Is your data on the cloud at risk?Is your data on the cloud at risk?
Is your data on the cloud at risk?
 
Sam -Firewall
Sam -FirewallSam -Firewall
Sam -Firewall
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private Networks
 
Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Hacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect YourselfHacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect Yourself
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 

Similar to Cyber attacks during COVID-19 Era

InfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsInfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security Tips
Liberteks
 

Similar to Cyber attacks during COVID-19 Era (20)

Working from home- How secure is it.pdf
Working from home- How secure is it.pdfWorking from home- How secure is it.pdf
Working from home- How secure is it.pdf
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
InfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsInfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security Tips
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdf
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
 
Security Tips To Keep Your Laptop Safe
Security Tips To Keep Your Laptop SafeSecurity Tips To Keep Your Laptop Safe
Security Tips To Keep Your Laptop Safe
 
How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19
 
Most Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling EnterprisesMost Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling Enterprises
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Managed Services: Turning Pandemic Into Profitable Protection
Managed Services: Turning Pandemic Into Profitable ProtectionManaged Services: Turning Pandemic Into Profitable Protection
Managed Services: Turning Pandemic Into Profitable Protection
 
How to Ensure Complete Data Protection at Work?
How to Ensure Complete Data Protection at Work?How to Ensure Complete Data Protection at Work?
How to Ensure Complete Data Protection at Work?
 
Managed Security: How Secure Are You During COVID?
Managed Security: How Secure Are You During COVID? Managed Security: How Secure Are You During COVID?
Managed Security: How Secure Are You During COVID?
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Why you need to secure mobile apps - now
Why you need to secure mobile apps - nowWhy you need to secure mobile apps - now
Why you need to secure mobile apps - now
 

Recently uploaded

(( wa 0851/7541/5434 )) Jual Obat Aborsi Di Surabaya - Cytotec Misoprostol 20...
(( wa 0851/7541/5434 )) Jual Obat Aborsi Di Surabaya - Cytotec Misoprostol 20...(( wa 0851/7541/5434 )) Jual Obat Aborsi Di Surabaya - Cytotec Misoprostol 20...
(( wa 0851/7541/5434 )) Jual Obat Aborsi Di Surabaya - Cytotec Misoprostol 20...
Spesiialis Kandungan BPOM
 
Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.
Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.
Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.
daisycvs
 
RATINGS OF EACH VIDEO FOR UNI PROJECT IWDSFODF
RATINGS OF EACH VIDEO FOR UNI PROJECT IWDSFODFRATINGS OF EACH VIDEO FOR UNI PROJECT IWDSFODF
RATINGS OF EACH VIDEO FOR UNI PROJECT IWDSFODF
CaitlinCummins3
 
What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...
srcw2322l101
 
NewBase 17 May 2024 Energy News issue - 1725 by Khaled Al Awadi_compresse...
NewBase   17 May  2024  Energy News issue - 1725 by Khaled Al Awadi_compresse...NewBase   17 May  2024  Energy News issue - 1725 by Khaled Al Awadi_compresse...
NewBase 17 May 2024 Energy News issue - 1725 by Khaled Al Awadi_compresse...
Khaled Al Awadi
 
Constitution of Company Article of Association
Constitution of Company Article of AssociationConstitution of Company Article of Association
Constitution of Company Article of Association
seri bangash
 
Creating an Income Statement with Forecasts: A Simple Guide and Free Excel Te...
Creating an Income Statement with Forecasts: A Simple Guide and Free Excel Te...Creating an Income Statement with Forecasts: A Simple Guide and Free Excel Te...
Creating an Income Statement with Forecasts: A Simple Guide and Free Excel Te...
Aurelien Domont, MBA
 
Jual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg Pfizer
Jual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg PfizerJual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg Pfizer
Jual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg Pfizer
Pusat Herbal Resmi BPOM
 

Recently uploaded (20)

(( wa 0851/7541/5434 )) Jual Obat Aborsi Di Surabaya - Cytotec Misoprostol 20...
(( wa 0851/7541/5434 )) Jual Obat Aborsi Di Surabaya - Cytotec Misoprostol 20...(( wa 0851/7541/5434 )) Jual Obat Aborsi Di Surabaya - Cytotec Misoprostol 20...
(( wa 0851/7541/5434 )) Jual Obat Aborsi Di Surabaya - Cytotec Misoprostol 20...
 
How to refresh to be fit for the future world
How to refresh to be fit for the future worldHow to refresh to be fit for the future world
How to refresh to be fit for the future world
 
Elevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO ServicesElevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO Services
 
Top^Clinic ^%[+27785538335__Safe*Women's clinic//Abortion Pills In Harare
Top^Clinic ^%[+27785538335__Safe*Women's clinic//Abortion Pills In HarareTop^Clinic ^%[+27785538335__Safe*Women's clinic//Abortion Pills In Harare
Top^Clinic ^%[+27785538335__Safe*Women's clinic//Abortion Pills In Harare
 
Progress Report - UKG Analyst Summit 2024 - A lot to do - Good Progress1-1.pdf
Progress Report - UKG Analyst Summit 2024 - A lot to do - Good Progress1-1.pdfProgress Report - UKG Analyst Summit 2024 - A lot to do - Good Progress1-1.pdf
Progress Report - UKG Analyst Summit 2024 - A lot to do - Good Progress1-1.pdf
 
Exploring-Pipe-Flanges-Applications-Types-and-Benefits.pptx
Exploring-Pipe-Flanges-Applications-Types-and-Benefits.pptxExploring-Pipe-Flanges-Applications-Types-and-Benefits.pptx
Exploring-Pipe-Flanges-Applications-Types-and-Benefits.pptx
 
Stages of Startup Funding - An Explainer
Stages of Startup Funding - An ExplainerStages of Startup Funding - An Explainer
Stages of Startup Funding - An Explainer
 
Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.
Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.
Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.
 
How Do Venture Capitalists Make Decisions?
How Do Venture Capitalists Make Decisions?How Do Venture Capitalists Make Decisions?
How Do Venture Capitalists Make Decisions?
 
RATINGS OF EACH VIDEO FOR UNI PROJECT IWDSFODF
RATINGS OF EACH VIDEO FOR UNI PROJECT IWDSFODFRATINGS OF EACH VIDEO FOR UNI PROJECT IWDSFODF
RATINGS OF EACH VIDEO FOR UNI PROJECT IWDSFODF
 
What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...
 
wagamamaLab presentation @MIT 20240509 IRODORI
wagamamaLab presentation @MIT 20240509 IRODORIwagamamaLab presentation @MIT 20240509 IRODORI
wagamamaLab presentation @MIT 20240509 IRODORI
 
NewBase 17 May 2024 Energy News issue - 1725 by Khaled Al Awadi_compresse...
NewBase   17 May  2024  Energy News issue - 1725 by Khaled Al Awadi_compresse...NewBase   17 May  2024  Energy News issue - 1725 by Khaled Al Awadi_compresse...
NewBase 17 May 2024 Energy News issue - 1725 by Khaled Al Awadi_compresse...
 
Constitution of Company Article of Association
Constitution of Company Article of AssociationConstitution of Company Article of Association
Constitution of Company Article of Association
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdf
 
Creating an Income Statement with Forecasts: A Simple Guide and Free Excel Te...
Creating an Income Statement with Forecasts: A Simple Guide and Free Excel Te...Creating an Income Statement with Forecasts: A Simple Guide and Free Excel Te...
Creating an Income Statement with Forecasts: A Simple Guide and Free Excel Te...
 
Blinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptx
Blinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptxBlinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptx
Blinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptx
 
Series A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by AccionSeries A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by Accion
 
Jual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg Pfizer
Jual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg PfizerJual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg Pfizer
Jual Obat Aborsi Di Sibolga wa 0851/7541/5434 Cytotec Misoprostol 200mcg Pfizer
 
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdfInnomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
 

Cyber attacks during COVID-19 Era

  • 1. Working from Home? Surge in Cyber Attacks
  • 2. BE ALERT Rasie your awareness! Be Alert everyone: due to COVID-19, there’s a surge in employees working from home. This rapid transition comes with its risks, which can only be mitigated once we understand and take necessary actions to protect ourselves and our organization from the cyber infiltrators. Indeed, the responsibility lies with the organization for providing necessary infrastructure & tools. However, in current times, it is also the user's responsibility to stay alert and find ways to fight the cyber attack on your organization. The information shared in this presentation is both for the New Home Users and the IT Teams, intended to raise awareness to protect against the rising cybercrimes on the back on COVID-19.
  • 3. NEW TO WFH? Raise your awareness 99% of ransomware attacks start from an email message. Don’t rush to click. Check before you open the email OR click on the URL OR open that attachment. It could be malicious! Call to verify: You may get a mail from your colleague or senior management asking to make payment transfers or share confidential information. STOP! Reach out via phone or over an online meeting to confirm the payment transfer request or sharing of the confidential information. On a closer look, you may or may not be able to identify that the request is coming from genuine sources. Search for Homoglyph attack. Remember: if it seems suspicious, it probably is. Investigate further or take advice.
  • 4. NEW TO WFH? Raise your awareness Wi-Fi: ensure your WI-FI is hidden and encrypted using WPA2. Check your router if it conforms to the latest standard. Or use wired instead. Personal Emails & Printers: Do not use personal emails or your home personal printers for your work-related matters. Collaboration: only use approved official collaboration tools, such as Microsoft Teams, Amazon Chime, Go-to-Meeting, Skype for Business etc. Alexa: ask Alexa or Google Home to stop listening. Turn it off or keep it away while having an official conversation.
  • 5. IT TEAMS Ready Yet? Are you using VDI yet? Virtual Desktop Infrastructure provides remote access to a virtual desktop, hosted on a centralized server. With VDI, device level security becomes less important as all user activities take place within the Virtual Machine. Is your VPN safe? Virtual Private Network is very commonly used. Ensure it meets your organization standards. Ensure your firewall can handle the massive traffic inflow. How about MFA? Multi-Factor Authentication: Ensure it is enforced for all users & Apps. Operating System: Have you installed the most updated OS, such as Windows 10? Firewall: Do you have a robust firewal in place? Is it capable to stop uninvited guests from browsing your network?
  • 6. IT TEAMS Ready Yet? Email Security: do you have a robust email security in place, to protect against targeted threats? Endpoint Security: Do you have the next-gen (AI/ ML) endpoint security to protect your remote devices? Brand Protect: What’s your plan to deal with malicious domains impersonating or replicating your digital assets before they do damage to your brand? Are you prepared to protect your customers and your partners  against attackers using your digital assets? Backup: Have you communicated how & where should the user backup their business data? Work from Home policy: finally, appreciate that its new for your office desktop users to work from home. Not only do you need the right tools & policies deployed across enterprise but also you need to provide user awareness training to keep them and the organization safe from malicious attacks.
  • 7. WORK WELL. SAFELY. H E A L T H I S W E A L T H Prevent the spread of COVID-19 Maintain Social Distancing WWW.ICDIGITAL.COM