• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
Housing Technology Main Logo

Housing Technology

Housing | IT | Telecoms | Business | Ecology

  • Free Subscription
  • Contact
  • Home
  • Research
  • Magazine
  • Events
  • Awards
  • Recruitment
  • On Demand
Home / Free Subscriber Access / Cyber security beyond Covid-19: 206 days & counting…

Cyber security beyond Covid-19: 206 days & counting…

Depending on which reports you read, the average time it takes to detect an intruder in your network after a compromise is 206 days…

Getting a sense of the overall threat landscape is rarely straightforward. The nature of cyber crime is dynamic; tactics and techniques fall in and out of vogue as criminals choose the path of least resistance.

In the wake of Covid-19, cyber criminals have latched onto the global emergency, seeking to exploit individuals and businesses through coronavirus-themed phishing campaigns, malicious apps and fraudulent outbreak map websites, to name just a few.

It’s well-reported that the cyber security industry is facing significant global shortages, both in numbers and skills. This shortage doesn’t only stretch cyber personnel, but IT professionals lumbered with security responsibilities on top of their existing workloads. They’re often in a continual state of deficiency, in numbers, expertise or both, with a multitude of security technologies to manage.

The wave of remote working across the UK due to Covid-19 is compounding these challenges. Traditional security perimeters are now decentralised, with no way to fully control what happens in the home-working environment. This expanding footprint can be likened to in-house IT and security personnel playing zone defence on a significantly larger pitch, but with far fewer players than its opponents, who have multiplied.

Cyber criminals are unlikely to be complaining as they look to exploit vulnerabilities wherever they exist and leverage whatever they can. They’re taking full advantage of understaffed businesses with limited abilities to prevent, detect and respond to attacks.

The primary trends observed by the IT Lab Cyber Security Operations Centre (CSOC) during the Covid-19 emergency have been the systematic targeting of users via phishing and their remote workplaces.

The blended home and workplace works in favour of cyber criminals. As remote workers cope with additional stresses and distractions, this arguably makes them more vulnerable to a phishing attack than before. Unsurprisingly, phishing has spiked in response to the emergency, which proves time and again to be an extremely effective method of defeating security defences.

Typically, a hacker must circumvent enterprise technology to compromise a network endpoint such as a laptop, mobile or tablet. But if not managed effectively, security controls are weakened by remote working because existing layers of security haven’t or can’t be applied or enforced.

Active attempts underway across the UK include:

  • Attacks on unprotected and unpatched devices to exploit existing vulnerabilities.
  • The installation of malware on users’ endpoints to intercept traffic and steal login credentials and other sensitive information.
  • Attacks on network domain name servers to redirect user requests to malicious websites.

It’s worth highlighting that cyber criminals are also targeting the commercial tools used to facilitate remote working, such as the Zoom remote conferencing platform. It’s unlikely that either remote workers or businesses could have anticipated that Zoom would bring the data loss and privacy dangers to the workplace that it has.

Most modern businesses have networks of third parties including outsourcing partners and vendors, with some representing a dependency for your own business. It’s vital that businesses look beyond their own realm and assess the information security and business continuity of third parties to determine how they are or could be affected by the crisis, and consequently what that risk could mean to them.

When the dust finally settles around Covid-19 and normality returns, businesses should take the opportunity to reflect on what did and didn’t go well. They should identify improvements to equip themselves for better business continuity. Don’t see a ‘lessons learned’ exercise as optional; it’s an opportunity to build on the approaches that worked and avoid repeating mistakes.

Businesses should:

  • Consider additional protection for their corporate networks, applications and data, with the expectation that cyber criminals can penetrate remotely-connected devices.
  • Protect the devices of their remote employees in the same way as they do for the systems on their corporate network.
  • Continue to educate employees on security practices, from the basics of avoiding opening unknown links to the protection of their remote workplace and home network. The shortage of cyber security skills and IT resources to protect remote workloads means some protection burden will fall on employees. It’s therefore vital to have a user-friendly cyber protection solution that doesn’t need excessive training to provide an adequate level of protection for home devices.

The reality is that while Covid-19 will eventually subside, the risk of a cyber attack won’t. Depending on which reports you read, the average time it takes to detect an intruder in your network after a compromise is an estimated 206 days. What will this look like in a post-Covid-19 world? It’s reasonable to expect that just when businesses regain stability, they will face another, equally merciless experience by way of a data breach.

Although the pandemic has been a global disaster, it presents a unique opportunity to improve your approach to cyber security and bring security awareness to all users.

As the shift towards remote working continues to grow, we can expect to see more managed security service providers (MSSPs) shouldering the cyber security burden. They’ll play a crucial role in deploying extra cyber protection capabilities for businesses and corporate infrastructures with remote working and the protection of homeworkers in mind.

Luke Kiely is the cyber security operations manager at IT Lab.

See More On:

  • Vendor: IT Lab
  • Topic: Infrastructure
  • Publication Date: 075 - May 2020
  • Type: Contributed Articles

Primary Sidebar

Most Recent Articles

  • Artificial intelligence in housing
  • Mobysoft – Data problems affecting complaints’ handling
  • Data, AI and private-sector strategies
  • Smart repairs & smarter homes
  • From firewalls to fortresses
  • Achieving three quick wins in AI
  • Rebuilding Selwood Housing’s IT infrastructure
  • Are you ready for organisational AI?
  • PIMSS releases AI Document Reader for compliance
  • Calico Homes cuts arrears with RentSense
  • FourNet launches digital transformation index
  • New income recovery software from Voicescape
  • Asprey Assets at YMCA
  • I love spreadsheets…
  • All watched over by machines of loving grace – AI assistants and adult social care
  • The rent revolution – The case for AI-powered payments
  • Unlocking safer living through data
  • Aareon acquires MIS ActiveH
  • Vericon launches MouldSense
  • Back to the future at Housing Technology 2025
  • FireAngel wins Which? Award
  • Maximising income and preventing homelessness
  • Anchoring digital innovation with Plentific
  • Cynon Taf Community Housing gets Housing Insight’s Arrears Manager
  • Tenants, AI & your biggest compliance risk
  • EDITOR’S NOTES – Data, standards & straight-through processing
  • AI as a social housing expert
  • South Yorkshire Housing halves arrears with Mobysoft
  • Bromford Flagship wins Aico’s smart-home competition
  • Putting VIVID’s customers in control of their tenancies

Footer

Housing Technology Main Logo
  • Instagram
  • LinkedIn
  • YouTube
  • Contact
  • Free Subscription
  • Book an event
  • Research
  • Update Your Subscription
  • Privacy Policy

Welcome to the housing Technology – Trusted Information For Business Professionals in HOusing

Housing Technology is the leading technology information service for the UK housing sector and local governments. We have always believed in the fundamental importance of how the UK’s social housing providers use technology to improve their tenants’ lives.

Subscribe to Housing Technology to gain market-leading research, unsurpassed peer networking opportunities and a greater understanding of your role to transform your business.

Copyright © The Intelligent Business Company 2025 | Terms and Conditions | Privacy Policy
Housing Technology is published by the The Intelligent Business Company. A company with limited liability. Registered in England No. 4958057 | Vat Registion No. 833 0069 55.

Registered Business Address: Hoppingwood Farm, Robin Hood Way, London, SW20 0AB | Telephone: +44 (0) 20 8336 2293