SlideShare a Scribd company logo
Cybersecurity in Pandemic time
Our business is in the most disruptive times now, and the cybercrimes are
also at their peak, giving nightmares to the business owners. Now
cybersecurity is one of the priority agenda among all the C-suite members of a
business.
Cybercrimes are emerging to second place, with 33% per cent of all types of
business-related fraud. Cybercrimes are accelerated during the pandemic
mainly because of remote work scenarios.
Data breaches, ransomware attacks, BEC and phishing attempts have
increased during remote work; according to the sources, over 60000 emails
per day include COVID related attachments or malicious websites.
The following are some examples of socially engineered scams happening in
this pandemic time.
 Mails camouflaged as government announcements: Various mails are
focusing on phishing, carrying government institutions logo and unnatural links
related to COVID-19.
 Fake medical advice: – Mails are sent as attachments my mentioning secure
cures related to COVID-19 in the name of known medical providers.
 Charity: Mails in a phishing nature is sent in the name of pandemic to solicit
donation
 BEC Campaigns:- Campaigns are initiated to target the operationally affected
industries.
 Unverified websites and mobile apps: During the pandemic most of the
companies are forced to adopt remote working and for this they need to use
various IT tools and platforms. Many companies have not checked the reliability
of the platforms they are using, which exposes their company to cyberattacks
and related frauds.
As cyberattacks and frauds proliferate during the crisis, companies need to
assess their cyber risks and prepare for potential threats regularly.
Cyber risks are unique to each company based on the activities and the data
they are handling; like financial institutions and healthcare companies that
handle a large amount of critical personal data. So, the company needs to
explore the cyberattacks considering the following points;
 Technical and operational activity and data attacks
 Business and financial activity and data attacks
 Regulatory and compliance-related attacks
The risk of cyberattacks is high, which results in increased costs to the
companies to safeguard them. But investment in resources and related tools
for assessing and mitigating cyber risks might be less than the legal and
financial consequences caused due to a cyber-attack.
HLB HAMT has a perfect team and having the right expertise, we helps many
organizations in/ by;
 Developing a risk-based security strategy to strengthen the basic security
coverage.
 Implementing and scaling out security controls.
 Provide training to the workforce.
 Choosing the right tools.
Get Free Consultation
Cybersecurity in Pandemic time
Level 18, City Tower-2,
Sheikh Zayed Road
PO Box 32665
Dubai – United Arab Emirates. Tel: +971 4 327 7775
E-mail: dubai@hlbhamt.com
www.hlbhamt.com

More Related Content

What's hot

Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testing
Cigniti Technologies Ltd
 
Vodqa why cybersecurity
Vodqa   why cybersecurityVodqa   why cybersecurity
Vodqa why cybersecurity
Dileep Bellamkonda
 
Should you beware of ransomware?
Should you beware of ransomware?Should you beware of ransomware?
Should you beware of ransomware?
Globizzcon
 
Proofpoint Understanding Email Fraud in 2018
Proofpoint Understanding Email Fraud in 2018 Proofpoint Understanding Email Fraud in 2018
Proofpoint Understanding Email Fraud in 2018
Proofpoint
 
Article is your organisation ready for the next ransomware attack - paul wr...
Article   is your organisation ready for the next ransomware attack - paul wr...Article   is your organisation ready for the next ransomware attack - paul wr...
Article is your organisation ready for the next ransomware attack - paul wr...
Paul Wright MSc
 
Lindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Lindsey Nelson, 2nd Cyber Insurance & Incident Response ConferenceLindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Lindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Starttech Ventures
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Report
accenture
 
Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
Quick Heal Technologies Ltd.
 
Malwarebytes labs 2019 - state of malware report 2
Malwarebytes labs 2019 - state of malware report 2Malwarebytes labs 2019 - state of malware report 2
Malwarebytes labs 2019 - state of malware report 2
Felipe Prado
 
Fortified Health Security - Horizon Report 2016
Fortified Health Security - Horizon Report 2016Fortified Health Security - Horizon Report 2016
Fortified Health Security - Horizon Report 2016Dan L. Dodson
 
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceCyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Statewide Insurance Brokers
 
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response ConferenceDavid Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
Starttech Ventures
 
Financier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewFinancier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual review
Morgan Jones
 
InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]Josh Stein
 
David Derigiotis, Cyber Insurance & Incident Response Conference 2021
David Derigiotis, Cyber Insurance & Incident Response Conference 2021David Derigiotis, Cyber Insurance & Incident Response Conference 2021
David Derigiotis, Cyber Insurance & Incident Response Conference 2021
Starttech Ventures
 
Can you predict who will win the US election?
Can you predict who will win the US election?Can you predict who will win the US election?
Can you predict who will win the US election?
Samvel Gevorgyan
 
Proofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint Q3 - 2017 Email Fraud Threat ReportProofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint
 
Verizon DBIR 2021
Verizon DBIR 2021Verizon DBIR 2021
Verizon DBIR 2021
SOCRadar Inc
 
Symantec Intelligence Report - Oct 2015
Symantec Intelligence Report - Oct 2015Symantec Intelligence Report - Oct 2015
Symantec Intelligence Report - Oct 2015
CheapSSLUSA
 

What's hot (20)

Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testing
 
Vodqa why cybersecurity
Vodqa   why cybersecurityVodqa   why cybersecurity
Vodqa why cybersecurity
 
Should you beware of ransomware?
Should you beware of ransomware?Should you beware of ransomware?
Should you beware of ransomware?
 
Proofpoint Understanding Email Fraud in 2018
Proofpoint Understanding Email Fraud in 2018 Proofpoint Understanding Email Fraud in 2018
Proofpoint Understanding Email Fraud in 2018
 
Article is your organisation ready for the next ransomware attack - paul wr...
Article   is your organisation ready for the next ransomware attack - paul wr...Article   is your organisation ready for the next ransomware attack - paul wr...
Article is your organisation ready for the next ransomware attack - paul wr...
 
Lindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Lindsey Nelson, 2nd Cyber Insurance & Incident Response ConferenceLindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Lindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Report
 
Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
Malwarebytes labs 2019 - state of malware report 2
Malwarebytes labs 2019 - state of malware report 2Malwarebytes labs 2019 - state of malware report 2
Malwarebytes labs 2019 - state of malware report 2
 
Fortified Health Security - Horizon Report 2016
Fortified Health Security - Horizon Report 2016Fortified Health Security - Horizon Report 2016
Fortified Health Security - Horizon Report 2016
 
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceCyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
 
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response ConferenceDavid Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
 
Financier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewFinancier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual review
 
InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]
 
David Derigiotis, Cyber Insurance & Incident Response Conference 2021
David Derigiotis, Cyber Insurance & Incident Response Conference 2021David Derigiotis, Cyber Insurance & Incident Response Conference 2021
David Derigiotis, Cyber Insurance & Incident Response Conference 2021
 
Can you predict who will win the US election?
Can you predict who will win the US election?Can you predict who will win the US election?
Can you predict who will win the US election?
 
Proofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint Q3 - 2017 Email Fraud Threat ReportProofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint Q3 - 2017 Email Fraud Threat Report
 
Verizon DBIR 2021
Verizon DBIR 2021Verizon DBIR 2021
Verizon DBIR 2021
 
SecurityInfographic
SecurityInfographicSecurityInfographic
SecurityInfographic
 
Symantec Intelligence Report - Oct 2015
Symantec Intelligence Report - Oct 2015Symantec Intelligence Report - Oct 2015
Symantec Intelligence Report - Oct 2015
 

Similar to Cybersecurity in Pandemic time.pdf

Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
kamranrazzaq8
 
Understanding the Biggest Cybersecurity Threats for Businesses Today.pdf
Understanding the Biggest Cybersecurity Threats for Businesses Today.pdfUnderstanding the Biggest Cybersecurity Threats for Businesses Today.pdf
Understanding the Biggest Cybersecurity Threats for Businesses Today.pdf
VLink Inc
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
Brafton
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Randall Chase
 
True Cost of Ransomware to Your Business
True Cost of Ransomware to Your BusinessTrue Cost of Ransomware to Your Business
True Cost of Ransomware to Your Business
IndusfacePvtLtd
 
5 Top Cyber Threats That Will Ruin Your Business
5 Top Cyber Threats That Will Ruin Your Business5 Top Cyber Threats That Will Ruin Your Business
5 Top Cyber Threats That Will Ruin Your Business
IndusfacePvtLtd
 
Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?
Ainsha Noordin (Umie)
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docx
meghanivkwserie
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docx
priestmanmable
 
LogRhythm Reducing cyber risk in the legal sector Whitepaper
LogRhythm Reducing cyber risk in the legal sector WhitepaperLogRhythm Reducing cyber risk in the legal sector Whitepaper
LogRhythm Reducing cyber risk in the legal sector WhitepaperTom Salmon
 
Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)Mark Baker
 
Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)Mark Baker
 
An Ounce of Prevention: How Healthcare Organizations Can Stop Cybercrime in I...
An Ounce of Prevention: How Healthcare Organizations Can Stop Cybercrime in I...An Ounce of Prevention: How Healthcare Organizations Can Stop Cybercrime in I...
An Ounce of Prevention: How Healthcare Organizations Can Stop Cybercrime in I...
Insight
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
Invincea, Inc.
 
8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docx8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docx
ArindamGhosal6
 
Cyber risks and liabilities newsletter jan feb 2017
Cyber risks and liabilities newsletter jan feb 2017Cyber risks and liabilities newsletter jan feb 2017
Cyber risks and liabilities newsletter jan feb 2017
Kieren Windsor
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
Cyber Security Planning 101
Cyber Security Planning 101Cyber Security Planning 101
Cyber Security Planning 101
Welch LLP
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Money 2Conf
 
Little book of cyber scams
Little book of cyber scamsLittle book of cyber scams
Little book of cyber scams
Eddie Hirst MSc MSyl
 

Similar to Cybersecurity in Pandemic time.pdf (20)

Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
 
Understanding the Biggest Cybersecurity Threats for Businesses Today.pdf
Understanding the Biggest Cybersecurity Threats for Businesses Today.pdfUnderstanding the Biggest Cybersecurity Threats for Businesses Today.pdf
Understanding the Biggest Cybersecurity Threats for Businesses Today.pdf
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
 
True Cost of Ransomware to Your Business
True Cost of Ransomware to Your BusinessTrue Cost of Ransomware to Your Business
True Cost of Ransomware to Your Business
 
5 Top Cyber Threats That Will Ruin Your Business
5 Top Cyber Threats That Will Ruin Your Business5 Top Cyber Threats That Will Ruin Your Business
5 Top Cyber Threats That Will Ruin Your Business
 
Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docx
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docx
 
LogRhythm Reducing cyber risk in the legal sector Whitepaper
LogRhythm Reducing cyber risk in the legal sector WhitepaperLogRhythm Reducing cyber risk in the legal sector Whitepaper
LogRhythm Reducing cyber risk in the legal sector Whitepaper
 
Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)
 
Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)
 
An Ounce of Prevention: How Healthcare Organizations Can Stop Cybercrime in I...
An Ounce of Prevention: How Healthcare Organizations Can Stop Cybercrime in I...An Ounce of Prevention: How Healthcare Organizations Can Stop Cybercrime in I...
An Ounce of Prevention: How Healthcare Organizations Can Stop Cybercrime in I...
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
 
8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docx8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docx
 
Cyber risks and liabilities newsletter jan feb 2017
Cyber risks and liabilities newsletter jan feb 2017Cyber risks and liabilities newsletter jan feb 2017
Cyber risks and liabilities newsletter jan feb 2017
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Cyber Security Planning 101
Cyber Security Planning 101Cyber Security Planning 101
Cyber Security Planning 101
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
 
Little book of cyber scams
Little book of cyber scamsLittle book of cyber scams
Little book of cyber scams
 

More from Fiyona Nourin

Recent updates in UAE.pdf
Recent updates in UAE.pdfRecent updates in UAE.pdf
Recent updates in UAE.pdf
Fiyona Nourin
 
Excise Tax in UAE – Scope Expansion.pdf
Excise Tax in UAE – Scope Expansion.pdfExcise Tax in UAE – Scope Expansion.pdf
Excise Tax in UAE – Scope Expansion.pdf
Fiyona Nourin
 
Regulation of the submission of reports by multi-national companies in UAE.pdf
Regulation of the submission of reports by multi-national companies in UAE.pdfRegulation of the submission of reports by multi-national companies in UAE.pdf
Regulation of the submission of reports by multi-national companies in UAE.pdf
Fiyona Nourin
 
UAE Implements New Law to Support Financially Insolvent Individuals.pdf
UAE Implements New Law to Support Financially Insolvent Individuals.pdfUAE Implements New Law to Support Financially Insolvent Individuals.pdf
UAE Implements New Law to Support Financially Insolvent Individuals.pdf
Fiyona Nourin
 
Cyber Security Strategies in UAE.pdf
Cyber Security Strategies in UAE.pdfCyber Security Strategies in UAE.pdf
Cyber Security Strategies in UAE.pdf
Fiyona Nourin
 
The Digital Future of HR.pdf
The Digital Future of HR.pdfThe Digital Future of HR.pdf
The Digital Future of HR.pdf
Fiyona Nourin
 
Blockchain Strategies in UAE.pdf
Blockchain Strategies in UAE.pdfBlockchain Strategies in UAE.pdf
Blockchain Strategies in UAE.pdf
Fiyona Nourin
 
Dubai Future District.pdf
Dubai Future District.pdfDubai Future District.pdf
Dubai Future District.pdf
Fiyona Nourin
 
New Business Incubator by Dubai SME.pdf
New Business Incubator by Dubai SME.pdfNew Business Incubator by Dubai SME.pdf
New Business Incubator by Dubai SME.pdf
Fiyona Nourin
 
2020 Towards the next 50.pdf
2020 Towards the next 50.pdf2020 Towards the next 50.pdf
2020 Towards the next 50.pdf
Fiyona Nourin
 
VAT on UAE Education Sector.pdf
VAT on UAE Education Sector.pdfVAT on UAE Education Sector.pdf
VAT on UAE Education Sector.pdf
Fiyona Nourin
 
The Role of Accountants in Detecting Fraud.pdf
The Role of Accountants in Detecting Fraud.pdfThe Role of Accountants in Detecting Fraud.pdf
The Role of Accountants in Detecting Fraud.pdf
Fiyona Nourin
 
DIFC Employee Workplace Savings Plan.pdf
DIFC Employee Workplace Savings Plan.pdfDIFC Employee Workplace Savings Plan.pdf
DIFC Employee Workplace Savings Plan.pdf
Fiyona Nourin
 
Timeframe for recovering Input Tax.pdf
Timeframe for recovering Input Tax.pdfTimeframe for recovering Input Tax.pdf
Timeframe for recovering Input Tax.pdf
Fiyona Nourin
 
VAT Errors and ways to rectify them.pdf
VAT Errors and ways to rectify them.pdfVAT Errors and ways to rectify them.pdf
VAT Errors and ways to rectify them.pdf
Fiyona Nourin
 
Working from home- How secure is it.pdf
Working from home- How secure is it.pdfWorking from home- How secure is it.pdf
Working from home- How secure is it.pdf
Fiyona Nourin
 
Transfiguring your business post COVID-19.pdf
Transfiguring your business post COVID-19.pdfTransfiguring your business post COVID-19.pdf
Transfiguring your business post COVID-19.pdf
Fiyona Nourin
 
Robotic Process Automation at Ports.pdf
Robotic Process Automation at Ports.pdfRobotic Process Automation at Ports.pdf
Robotic Process Automation at Ports.pdf
Fiyona Nourin
 
A Guide on Statutory leaves in the United Arab Emirates.pdf
A Guide on Statutory leaves in the United Arab Emirates.pdfA Guide on Statutory leaves in the United Arab Emirates.pdf
A Guide on Statutory leaves in the United Arab Emirates.pdf
Fiyona Nourin
 
Accountants Combat Fraud during COVID-19 Pandemic.pdf
Accountants Combat Fraud during COVID-19 Pandemic.pdfAccountants Combat Fraud during COVID-19 Pandemic.pdf
Accountants Combat Fraud during COVID-19 Pandemic.pdf
Fiyona Nourin
 

More from Fiyona Nourin (20)

Recent updates in UAE.pdf
Recent updates in UAE.pdfRecent updates in UAE.pdf
Recent updates in UAE.pdf
 
Excise Tax in UAE – Scope Expansion.pdf
Excise Tax in UAE – Scope Expansion.pdfExcise Tax in UAE – Scope Expansion.pdf
Excise Tax in UAE – Scope Expansion.pdf
 
Regulation of the submission of reports by multi-national companies in UAE.pdf
Regulation of the submission of reports by multi-national companies in UAE.pdfRegulation of the submission of reports by multi-national companies in UAE.pdf
Regulation of the submission of reports by multi-national companies in UAE.pdf
 
UAE Implements New Law to Support Financially Insolvent Individuals.pdf
UAE Implements New Law to Support Financially Insolvent Individuals.pdfUAE Implements New Law to Support Financially Insolvent Individuals.pdf
UAE Implements New Law to Support Financially Insolvent Individuals.pdf
 
Cyber Security Strategies in UAE.pdf
Cyber Security Strategies in UAE.pdfCyber Security Strategies in UAE.pdf
Cyber Security Strategies in UAE.pdf
 
The Digital Future of HR.pdf
The Digital Future of HR.pdfThe Digital Future of HR.pdf
The Digital Future of HR.pdf
 
Blockchain Strategies in UAE.pdf
Blockchain Strategies in UAE.pdfBlockchain Strategies in UAE.pdf
Blockchain Strategies in UAE.pdf
 
Dubai Future District.pdf
Dubai Future District.pdfDubai Future District.pdf
Dubai Future District.pdf
 
New Business Incubator by Dubai SME.pdf
New Business Incubator by Dubai SME.pdfNew Business Incubator by Dubai SME.pdf
New Business Incubator by Dubai SME.pdf
 
2020 Towards the next 50.pdf
2020 Towards the next 50.pdf2020 Towards the next 50.pdf
2020 Towards the next 50.pdf
 
VAT on UAE Education Sector.pdf
VAT on UAE Education Sector.pdfVAT on UAE Education Sector.pdf
VAT on UAE Education Sector.pdf
 
The Role of Accountants in Detecting Fraud.pdf
The Role of Accountants in Detecting Fraud.pdfThe Role of Accountants in Detecting Fraud.pdf
The Role of Accountants in Detecting Fraud.pdf
 
DIFC Employee Workplace Savings Plan.pdf
DIFC Employee Workplace Savings Plan.pdfDIFC Employee Workplace Savings Plan.pdf
DIFC Employee Workplace Savings Plan.pdf
 
Timeframe for recovering Input Tax.pdf
Timeframe for recovering Input Tax.pdfTimeframe for recovering Input Tax.pdf
Timeframe for recovering Input Tax.pdf
 
VAT Errors and ways to rectify them.pdf
VAT Errors and ways to rectify them.pdfVAT Errors and ways to rectify them.pdf
VAT Errors and ways to rectify them.pdf
 
Working from home- How secure is it.pdf
Working from home- How secure is it.pdfWorking from home- How secure is it.pdf
Working from home- How secure is it.pdf
 
Transfiguring your business post COVID-19.pdf
Transfiguring your business post COVID-19.pdfTransfiguring your business post COVID-19.pdf
Transfiguring your business post COVID-19.pdf
 
Robotic Process Automation at Ports.pdf
Robotic Process Automation at Ports.pdfRobotic Process Automation at Ports.pdf
Robotic Process Automation at Ports.pdf
 
A Guide on Statutory leaves in the United Arab Emirates.pdf
A Guide on Statutory leaves in the United Arab Emirates.pdfA Guide on Statutory leaves in the United Arab Emirates.pdf
A Guide on Statutory leaves in the United Arab Emirates.pdf
 
Accountants Combat Fraud during COVID-19 Pandemic.pdf
Accountants Combat Fraud during COVID-19 Pandemic.pdfAccountants Combat Fraud during COVID-19 Pandemic.pdf
Accountants Combat Fraud during COVID-19 Pandemic.pdf
 

Recently uploaded

Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
Aurelien Domont, MBA
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
Lital Barkan
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
uae taxgpt
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
marketingjdass
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ofm712785
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
seri bangash
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Arihant Webtech Pvt. Ltd
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
NathanBaughman3
 

Recently uploaded (20)

Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
 

Cybersecurity in Pandemic time.pdf

  • 1. Cybersecurity in Pandemic time Our business is in the most disruptive times now, and the cybercrimes are also at their peak, giving nightmares to the business owners. Now cybersecurity is one of the priority agenda among all the C-suite members of a business. Cybercrimes are emerging to second place, with 33% per cent of all types of business-related fraud. Cybercrimes are accelerated during the pandemic mainly because of remote work scenarios. Data breaches, ransomware attacks, BEC and phishing attempts have increased during remote work; according to the sources, over 60000 emails per day include COVID related attachments or malicious websites. The following are some examples of socially engineered scams happening in this pandemic time.  Mails camouflaged as government announcements: Various mails are focusing on phishing, carrying government institutions logo and unnatural links related to COVID-19.  Fake medical advice: – Mails are sent as attachments my mentioning secure cures related to COVID-19 in the name of known medical providers.  Charity: Mails in a phishing nature is sent in the name of pandemic to solicit donation  BEC Campaigns:- Campaigns are initiated to target the operationally affected industries.  Unverified websites and mobile apps: During the pandemic most of the companies are forced to adopt remote working and for this they need to use various IT tools and platforms. Many companies have not checked the reliability of the platforms they are using, which exposes their company to cyberattacks and related frauds. As cyberattacks and frauds proliferate during the crisis, companies need to assess their cyber risks and prepare for potential threats regularly.
  • 2. Cyber risks are unique to each company based on the activities and the data they are handling; like financial institutions and healthcare companies that handle a large amount of critical personal data. So, the company needs to explore the cyberattacks considering the following points;  Technical and operational activity and data attacks  Business and financial activity and data attacks  Regulatory and compliance-related attacks The risk of cyberattacks is high, which results in increased costs to the companies to safeguard them. But investment in resources and related tools for assessing and mitigating cyber risks might be less than the legal and financial consequences caused due to a cyber-attack. HLB HAMT has a perfect team and having the right expertise, we helps many organizations in/ by;  Developing a risk-based security strategy to strengthen the basic security coverage.  Implementing and scaling out security controls.  Provide training to the workforce.  Choosing the right tools. Get Free Consultation
  • 3. Cybersecurity in Pandemic time Level 18, City Tower-2, Sheikh Zayed Road PO Box 32665 Dubai – United Arab Emirates. Tel: +971 4 327 7775 E-mail: dubai@hlbhamt.com www.hlbhamt.com