New Solutions to New Threat: Optimizing the Remote Work Environment during a Global COVID- Pandemic
Given the continuous political turmoil emanating from the nations capital for the past three and a half years, few observers would likely have regarded 2019 as the good old days, but the multiple crises of an ongoing global COVID-19 pandemic combined with a devastated economy, massive unemployment and growing unrest over racial disparities underscore just how fast things can change and how bad things can get without warning. Indeed, the good old days of 2019 appear golden by comparison, and there is currently no real end in sight. These trends have introduced new issues with respect to what types of information security education and maintenance and what protocols are necessary in the wake of the ongoing COVID-19 pandemic as well as comparable calamitous events in the future. The purpose of this research paper is to provide a review of the relevant literature concerning the optimal management of COVID-19 within the management sectors of a cybersecurity infrastructure, as well as address similar societal disasters that should be taken into consideration in the future. Finally, a summary of the research and important findings concerning information security education and maintenance are presented in the papers conclusion.
I. The Current Situation and How It Has Impacted Information Security and Cybersecurity
The number of cases and the death toll attributable to the COVID-19 virus have streadily increased across the country in recent months, and companies of all sizes and types have been hammered by a combination of a turbulent presidential election of unprecedented import, an unrelenting economic downturn, growing civil unrest and increasingly severe climate change-related events that have caused some of the worst unemployment rates in the countrys history. While the current situation is highly dynamic and global COVID-19 case numbers continue to swell by the hour, at the time of this writing more than 40 million people worldwide had been infected by the virus and more than 1.5 million had died from it based on the statistical data that is compiled by Johns Hopkins University each day. From a strictly pragmatic perspective, one of the few bright spots on the current economic horizon has been the growing demand for the accelerated domestic manufacture of personal protective equipment and therapeutic drugs by local, state and federal government agencies (Meredith, 2020).
Against this grim backdrop and as discussed further in the sections that follow below, it is not surprising that the current situation for cybersecurity has also been challenging and increasingly threatening. For example, according to Martinelli and Friedman (2020), There have been several reports from the [information technology] community that there have been more attacks against...
Indeed, cybersecurity was a persistent threat before COVID-19, and not surprisingly, organizations continue to face increasing risks in this area (p. 60). Unfortunately, although the risks that are associated with IT resources continue to accelerate, there has not generally been a corresponding response on the part of the information security community.A growing body of research confirms that nature imbues many predators with the ability to detect fear, and the current situation is similar with respect to hackers smelling blood among their traditional prey today. This sense of opportunity may help account for the increased cyberattacks that have been experienced by the private and public sectors over the past several months, but the threat has always been there only now it has become more intensified. For instance, one mainstream newspaper warns its readers that:
The COVID-19 pandemic has changed our daily lives and routines dramatically. However, it seems that hackers remain...
…3). Based on an analysis of lessons learned from past InfoSec failures with social media platforms, the UK National Cyber Security Center recommends that organizations take the following actions to harden their cybersecurity. With respect to individuals and organizations:Limit screensharing options;
Do not make meetings public;
Do not share links to meetings on unrestricted, publicly available social media posts;
Ensure users have the most up-to0-date versions of remote access/meeting applications; and,
Ensure telework policies address requirements for physical and information security (COVID-19 Cyber threat exploitation, 2020).
In addition, other lessons learned include the fact that even the most sophisticated security protocols that have been implemented in the past may become obsolete or otherwise vulnerable to novel cyberattacks without warning, and the potential for additional and more severe attacks increases as hackers gain experience and share their empirical observations from the field with others (Mookerjee et al., 2011).
Conclusion and Reflection
The world has always been a hostile environment for humankind, but the recent months have been characterized by a unique mix of anthropogenic crises and natural disasters that have taxed the ability of the most sophisticated cybersecurity networks to protect vital information resources. The research showed that the optimal management of COVID-19 and comparable societal disasters requires ongoing diligence to assess the adequacy and appropriate of existing security protocols and weighing these resources against essential industry cybersecurity control benchmarks. The research was also consistent in showing that far too many organizations are unprepared for existing and evolving cybersecurity threats, but here agin there are some strategies available to help organizations of all sizes and types inform, educate and train their employees concerning these trends and to emphasize the importance of their consistently following security protocols. Finally, organizations must ensure that they have sufficient off-site data backups and security procedures in place to restore…
References
Alert AA20-126A. (2020, May 5). Cybersecurity & Infrastructure Security Agency. Retrieved from https://us-cert.cisa.gov/ncas/alerts/AA20126A.
COVID-19 Cyber threat exploitation. (2020). National Cyber Security Centre. Retrieved from https://www.cisa.gov/sites/default/files/publications/Joint_CISA_UK_Tip-COVID-19_Cyber_Threat_Exploitation_S508C.pdf.
COVID-19 pandemic has hackers working OT. (2020, April). USA Today, 148(2899), 13.
Davis, S. (2010, November 25). Effective training and policy takes the fear out of social networking. Illinois Institute of Technology White Paper: Author.
Lanz, J. & Sussman, B. I. (2020, June). Information security program management in a COVID-19 world. The CPA Journal, 90(6), 28.
Martinelli, M., Friedman, A. E. & Lanz, J. (2020, June). The impact of COVID-19 on internal audits. The CPA Journal, 90(6), 60.
Meredith, S. (2020, October 22). Learn to live with the pandemic: Physicians warn that a vaccine may not prevent Covid from becoming endemic. CNBC. Retrieved from https://www.cnbc.com/2020/10/22/coronavirus-physicians-warn-virus-may-become-endemic-despite-vaccine.html.
Mookerjee, V., Mookerjee, R., Bensoussan, A. & Yue, W. T. (2011, April 8). When hackers talk: Managing information security under variable attack rates and knowledge dissemination. Information Systems Research, 22(3), 410-420.
Mutune, G. (2019, August). Ten essential cybersecurity controls. CyberExperts. Retrieved from https://cyberexperts.com/cybersecurity-controls/.
Patrick, B. (2020, September). Stymie hackers with these six steps. Journal of Accountancy, 230(3), 79-83.
Schultz, A. (2009, December 23). Controlling the emerging data dilemma: Building policy for unstructured data access. Illinois Institute of Technology White Paper: Author.
Trump’s America in 2024. (2020, October 23). The Washington Post. Retrieved from https://www.washingtonpost.com/opinions/trumps-america-in-2024/2020/10/23/f7be173a-14a6-11eb-bc10-40b25382f1be_story.html.
Pandemic Flu Apart from the seasonal influenza epidemics caused by antigenic drifts, a significant change in the virus's virulence through antigenic shifts has been a major source of concern for healthcare professionals. These new strains may reach pandemic proportions. Predicting the next outbreak is an impossible task but historically, the longest period between two outbreaks has been forty one years and it usually occurs every 30-40 years. An outbreak can reach
Pandemic Flu Impact on Ethics in Nursing Practice Pandemic flu: A literature review The dire scenario of a pandemic flu is likely to strike fear in the heart of many healthcare workers, regardless of the level of their experience and knowledge. The 2009-2010 flu season brought additional attention to the issue. 208 countries "had confirmed cases of pandemic influenza H1N1 2009 and [stated] that over 13,000 people had died as a direct
In other words, the PAHPA should protect volunteers (that rush to the scene of a disaster like Hurricane Katrina) from lawsuits for their "non-criminal actions" in humanitarian efforts (Hodge, p. 3). Also, Hodge writes that PAHPA does not "…ensure adequate economic incentives to stimulate maximum private sector participation"; in other words, pharmaceutical companies asked to produce vaccines for potential bio-terror attacks, are not guaranteed a return on their investment to
To meet substantive due process, a public health intervention must be based on a public health necessity, an effective intervention, have a demonstrable means-end connection, be proportionate to the threat involved, and be the least restrictive means of accomplishing the goal. In addition, Daubert explains the parameters of the procedural due process. Due process in a quarantine situation does not always involve a judicial hearing, but it must contain
PAPER 8Paper 3IntroductionTo a large extent, the COVID-19 pandemic could be described as one of the worst pandemics the world has experienced in modern times. In addition to occasioning the death of millions of people, this particular pandemic was especially taxing for healthcare systems across the world. For instance, in the U.S., hospitals had to continue routine medical care roles while at the same time attending to the needs of
Future: For many centuries, the influenza virus has been a threat to the health of humans as strains of this virus continue to spread quickly worldwide, especially during the flu season i.e. from late fall through winter. It's estimated that between 5% to 20% of America's population contact the flu and exhibit symptoms like headaches, digestive and breathing difficulties, muscle aches, and high fever. As a result, an estimated 36,000
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now