Before Covid-19, cyber security teams already confessed to being overworked - battling simply to keep their heads above a constant tide of security alerts, across numerous tools and reports.
High profile security breaches, with malware at their root, were a seemingly weekly occurrence. The financial and reputational damage that followed were often as had to recover from as the attack itself. It comes as no surprise that many businesses have resorted to simply paying off cybercriminals.
Now Covid-19 is adding its burden to the cyber risks IT teams are having to battle against.
With many workforces working entirely from home, outside the traditional office security firewalls and processes, any pre-held notions of working in a post-security perimeter world are being tested.
Computing's upcoming webinar will draw on the latest developments, trends and experiences in malware to explore what best practice for malware prevention and remediation looks like today.
It will discuss incident frequency and remediation times, financial and reputational implications, and reveal what organisations should be doing differently to quickly recover from a malware attack. It will also examine how changing working habits amidst Covid-19 are affecting this, and what the implications will be of the ‘new normal' that will follow: How do we best secure our organisations after the pandemic?
Huawei may be a risk but the West should compete with Chinese firms rather than banning, says ex-Google CEO Eric Schmidt
'The Chinese are just as good, and maybe better, in key areas of research and innovation' Schmidt says
CIA discovered the breach only after classified information was published by WikiLeaks
Home working shouldn't prioritise productivity at the expense of security, but in some cases this is exactly what's happening
Join us for our live virtual event on 18th June