Criminals thrive in times of uncertainty and fear, and the UK’s National Cyber Security Centre (NCSC) has already reported an increase in cyber threats which refer directly to the coronavirus. This guide outlines the key steps to basic cyber hygiene and highlights some useful resources.
Cyber security during the coronavirus pandemic
The COVID-19 crisis has escalated the risk of malicious cyber attacks as organisations large and small increase their reliance on remote working and online services. This page gathers together ICAEW insights and externally-produced resources providing practical advice on how to keep your IT systems and networks safe.
It's a sad fact that criminals thrive in times of uncertainty and fear, and there's already been a spike in cyber attacks related to the coronavirus outbreak. With so many employees now working at home, often using new unfamiliar apps, companies need to be especially vigilant regarding cyber threats. So here is a quick reminder of some basic good practices and some useful resources to share with staff.
Updated 23 April: Within 24 hours of the government’s Coronavirus Job Retention Scheme being launched, online fraudsters had sent a flurry of phishing emails targeting unsuspecting businesses claiming to be from HMRC chief executive, Jim Harra.
17 April 2020: the spike in home-working has forced organisations to look at how they deal with card payments and data.
How should financial services respond to coronavirus and the cyber-security threats that come with it?
Premium Content: This is exclusive item - please log in or subscribe to view this item.
In 2002 the then US Secretary of Defence, Donald Rumsfeld claimed that when he looked to the future he saw two kinds of unforeseen event: the “known unknown” and the “unknown unknown”. Rumsfeld was lampooned for his statement at the time, but with the rise of COVID-19 and its knock on effects on IT systems across the world, many are coming face to face with the stark reality of this infamous truism.
White paper published by PwC on the role of Identity and Access Management (IAM) to cyber security and the current and future challenges to enabling access to a remote workforce, ensuring continuity of services, and managing risks and compliance. The paper discusses the principles needed for robust enterprise IAM services, the lasting impact of COVID-19, and wider priorities to address different COVID-19 scenarios.
The EU Agency for Cybersecurity has developed 10 tips for SMEs and citizens to stay secure when buying and selling online which may be an issue during the COVID-19 emergency.
Report gives in-depth look at how COVID-19 has created new opportunities for cyber threats (including remote working) and the steps that organisations should take to mitigate these risks.
Guidance outlining the types of scams that have increased during the COVID-19 emergency and guidance on how to deal with them.
Article outlines the threats and gives cyber-security tips for home-working.
Guide by the UK's National Cyber Security Centre (NCSC) to help organisations protect against risks from increased home working, plus advice on spotting coronavirus (COVID-19) scam emails. It gives practical recommendations on setting up new accounts and accesses, preparing for home working, controlling access to corporate systems, helping staff to look after devices, removable media, using personal rather than work devices – alongside links to more detailed guidance on choosing and setting up systems. See also the news story Cyber experts step in as criminals seek to exploit Coronavirus fears.
Answers from the Information Commissioner's Office (ICO) to some frequently asked questions on how organisations and employers can maintain data protection compliance and information security during the COVID-19 outbreak, including specific advice for healthcare organisations.
ICAEW accepts no responsibility for the content on any site to which a hypertext link from this site exists. The links are provided ‘as is’ with no warranty, express or implied, for the information provided within them. Please see the full copyright and disclaimer notice.