Because of the coronavirus, countless events, gatherings,
conferences, and other social gatherings have been cancelled. Since most of the
technology is made by China, the supply chains have been in put in jeopardy
since the outbreak began. It appears like even the tech industry can’t avoid
getting drawn into the gravity of COVID-19.
Although this pandemic is not hitting everybody yet with deadly
force, over time, it may lead to some major disruptions for various individuals
and organizations. This is not to downplay the pandemic’s severity, but there
are a few useful parallels to how you can manage cyberthreats.
Containment Isn’t Perfect
Issuing a quarantine is among the first moves during an
outbreak to contain the spread of the virus. Simply put, nobody is allowed to
leave their homes so that the threat would be bottled up. However, quarantines
tend to leak and the virus will start to spread anyway. Containment methods
leak, just like the most common cybersecurity controls.
You need to evaluate what is involved in the pandemic. It’s
just a range of strategies that are applied in different ways. Infected
individuals are isolated, which is just like how bot detection and anti malwaretools lock down certain machines. Specific quarantine guidelines are issued on
geographic areas, which are similar to how you use network segmentation through
firewalls. Logging and monitoring is similar to contract tracing while a travel
ban is like decryption and traffic inspection to prevent threats from gaining
access to your network.
Does this mean you should get rid of your firewall? Of
course not. Quarantine is not expected to prevent a pandemic right away. Just
like firewalls, these controls are all about reducing and managing the threat.
This could mean cutting bock the flood to a river. It could mean providing you
with more data about the velocity, size, and the nature of the ongoing threat.
Containment could give you time so that you could prepare your other defenses.
Time Is A Precious Resource
In cases when threats are affecting crucial assets and
services, time is your most important resource. Whether it is a pandemic or a online threat, every second have to count. Tools such as containment will provide
you with more time. However, you also have to use other tools. You need
intelligence to inform you on what they look like, what threats are coming, and
what assets may be affected. You need thoughtful analysis and data to show how
you can make use of your time. You have to plan, and then prepare, as well as
practice ahead of time so that you will have the correct responses and tools
prepare when something goes crazy.
A part of the needed preparation and making use of your time
well is to ensure that the executives are briefed on the possible threats and
the potential consequences. This too, will need time and during a crisis, you
might not have enough to explain or to correct misconceptions.
Call SpartanTec, Inc. in Fayetteville for more information about cybersecurity.
SpartanTec, Inc.
Fayetteville, NC 28304
(910) 745-7776
http://manageditservicesfayetteville.com
Cities Served:
Fayetteville, Spring Lake, Hope Mills, Dunn, Aberdeen, Southern Pines, Pinehurst, Sanford, Clinto
Fayetteville, NC 28304
(910) 745-7776
http://manageditservicesfayetteville.com
Cities Served:
Fayetteville, Spring Lake, Hope Mills, Dunn, Aberdeen, Southern Pines, Pinehurst, Sanford, Clinto