‘COVID-19 is not just a virus, it is a major, successful, attack theme’
Cyber security solutions provider Check Point Software Technologies says research shows the East African region has experienced nearly three times the global average in cyber-attacks, and internationally, 95% of security professionals are facing added IT security challenges due to COVID-19.
During a recent webinar Coronavirus: The Day After Preparing For The Next Global Crisis – A Cyber Pandemic, hosted in collaboration with Ethiopia-based IT solutions firm Deliver ICT, experts delved into essential cyber security strategies that businesses will need post-COVID-19.
According to Check Point Software, the World Economic Forum warned that the world should prepare for a COVID-like global cyber pandemic that will spread faster and further than a biological virus, with an equal or greater economic impact.
With cyber security now considered a business enabler, Ethiopian security executives will play a key role in securing their organisations.
New cyber security normal
Remote work has become the new norm, with country-mandated lockdowns accelerating the transition of employees to work from home, allowing them to access corporate resources through secure access.
The crisis has forced companies to accelerate their technological transformation with cloud resources as the top priority. This has created a ‘just do it’ mindset, increasing organisations cyber risks as corners are cut to meet the burning demand for connectivity.
Check Point research teams found a dramatic rise in cyberattacks in correlation with the spread of the virus, and an alarming amount of phishing attacks trying to exploit this fear. COVID-19 is not just a virus, it is a major, successful, attack theme, according to the company.
Hackers are taking advantage of this fear factor to target enterprises and consumers alike for financial gains, using different methods and attack vectors.
“What we have seen is that cybercriminals are targeting high unemployment rates and are disguising malware in the form of CV’s. These CV’s seem honest, however when opened within an organisation by HR personal, the infection will occur,” says Matan Burstein, Security Engineering Manager Africa at Check Point Software.
The pandemic will disappear - Its cyber effect will not
The trends of the coronavirus have dramatically changed the way we work. The accelerated pace of digital transformation, remote access infrastructure, and the rapid move to the cloud—are known trends by cybercriminals. Businesses need to be proactive and secure themselves in the new normal by focusing on:
Real-time prevention: Prevention is better than treatment. Likewise, in cyber security, real-time prevention is the key to protecting our organisations and employees from a cyber-attack of cataclysmic, cyber pandemic proportions.
Secure everything: It is vital for organisations to revisit and check the security level and relevance of their network’s infrastructures, processes, compliance of connected mobile and PC devices, IoT, among others. The increased use of the cloud means an increased level of security, especially in technologies that secure workloads, containers, and serverless applications on multi- and hybrid-cloud environments.
Consolidation and visibility: The highest level of visibility, reached through consolidation, will increase effectiveness. You need a unified management and improved risk visibility to your entire security architecture, and this can only be achieved by reducing the number of point product solutions and vendors.
Biological pandemic vs cyber pandemic
Check Point Software researchers have seen parallels between the COVID-19 pandemic and cyber pandemic. They share many similarities such as infection rate, infection prevention and safety best practices.
“Similar to how a person would adopt best practices such as wearing a mask, maintaining hygiene and social distancing, so to must businesses. Businesses today need remain aware of the current cyber threats, maintain cyber hygiene by ensuring compliance and distance their assets through network segmentation and multi-factor authentication,” says Burstein.
Melkamu Bade, Director of Deliver ICT, added, “Through our partnership with Check Point, we aim to provide highly influential cyber security and IT solutions starting from the business need, justification up to technical solutions within Ethiopia.”