Whitepaper

Finding the perfect balance for your Security Operations Architecture

You are one step away to download

Summary

Globally organisations have had to shift their employees to work from home for the foreseeable future due to the COVID-19 pandemic. This means that organizations will have a largely (or entirely) remote workforce for the first time, instead of a few privileged employees who had this benefit till now.

This creates a situation that is ripe for cybercriminals and nation-state actors to exploit. There have been a rapid adoption of COVID-19 themed phishing scams, threat actors — both nation-state and cybercriminal — are quick to exploit new and evolving situations. Since the beginning in late January 2020, the volume of data increases, with larger spikes occurring as the number of COVID-19 infections increased through the month of February and March.

More in spotlight

businessman-protect-with-virtual-guard-key-access-biometric-data-by-input-password-fingerprint-scanner-access-security-system-futuristic-technology-concept
Third Party Risk Management Brochure
businessman-protect-with-virtual-guard-key-access-biometric-data-by-input-password-fingerprint-scanner-access-security-system-futuristic-technology-concept
Identity and Access Management Brochure
cloud-edge-computing-technology-concepts-with-cybersecurity-protection
Cyber Advisory Brochure
Cyber Fusion Center
CFC BROCHURE
Skip to content