{"id":16504,"date":"2020-05-26T14:00:13","date_gmt":"2020-05-26T17:00:13","guid":{"rendered":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=16504"},"modified":"2020-05-26T11:59:16","modified_gmt":"2020-05-26T14:59:16","slug":"the-cyber-threat-impact-of-covid-19-to-global-business","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/the-cyber-threat-impact-of-covid-19-to-global-business\/","title":{"rendered":"The Cyber Threat Impact of COVID-19 to Global Business"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-16505\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2020\/05\/the-cyber-threat-impact-of-covid-19-to-global-business.jpg\" alt=\"The Cyber Threat Impact of COVID-19 to Global Business\" width=\"145\" height=\"188\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2020\/05\/the-cyber-threat-impact-of-covid-19-to-global-business.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2020\/05\/the-cyber-threat-impact-of-covid-19-to-global-business-116x150.jpg 116w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>IntSights<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>R\u00e9sum\u00e9:<\/strong><\/span> The COVID-19 pandemic has altered the way business is done around the world. With predominantly remote workforces operating on unsecured home networks, corporate security teams are struggling to gain control of rapidly expanding attack surfaces.<br \/>\nCybercriminals and state-sponsored advanced threat groups are exploiting the COVID-19 pandemic to attack networks around the world for both financial and strategic gain. Between January and March, coronavirus-themed phishing lures, malware infections, network intrusions, scams, and disinformation campaigns have become rampant across the clear, deep, and dark web.<br \/>\nIntSights researchers put together this report to explore the most prevalent COVID-19 cyber threats: phishing websites and emails, fake coronavirus mobile apps, malware, ransomware, fraud, and disinformation. We also address the criminal and state-sponsored threat actors behind these campaigns, the most common types of targets, and network indicators of compromise.<br \/>\nWhat started as simple phishing attacks and hand sanitizer scams now involves several well-known threat actors. APT36, FIN7, the Maze ransomware group, and several other nation state actors are now behind attacks related to the coronavirus pandemic. As sophisticated threat actors enter this ring, both the volume and sophistication of the attacks will likely increase.<\/p>\n<p>IntSights recommends the following steps for defense against these threats:<\/p>\n<ul>\n<li>Update the current threat landscape risk assessment based on new emerging threats to remote workers.<\/li>\n<li>Closely monitor collaboration and remote working tools.<\/li>\n<li>Strictly enforce the use of VPNs, encryption, and endpoint security.<\/li>\n<li>Enforce strong password policy and 2FA.<\/li>\n<li>Educate end users on the new threat landscape.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.bibliotecadeseguranca.com.br\/wp-content\/uploads\/2020\/05\/the-cyber-threat-impact-of-covid-19-to-global-business.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-12143 size-full\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2015\/03\/download_fr.gif\" alt=\"T\u00e9l\u00e9charger\" width=\"107\" height=\"25\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>IntSights R\u00e9sum\u00e9: The COVID-19 pandemic has altered the way business is done around the world. With predominantly remote workforces operating on unsecured home networks, corporate security teams are struggling to gain control of rapidly expanding attack surfaces. Cybercriminals and state-sponsored advanced threat groups are exploiting the COVID-19 pandemic to attack networks around the world for both financial and strategic gain. Between January and March, coronavirus-themed phishing lures, malware infections, network&hellip; <\/p>\n","protected":false},"author":3,"featured_media":16505,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,23,6,20,112],"tags":[],"class_list":["post-16504","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-english","category-gestao-da-seguranca-empresarial","category-livros","category-seguranca-da-informacao","category-download"],"views":95,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/16504","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=16504"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/16504\/revisions"}],"predecessor-version":[{"id":16506,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/16504\/revisions\/16506"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/16505"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=16504"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=16504"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=16504"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}