SlideShare a Scribd company logo
Cyber Challenge during this pandemic
Partho Kumar Saha
Cybersecurity
Cyber security is the practice of
defending computers, servers,
mobile devices, electronic systems,
networks, and data from malicious
attacks. It's also known as
information technology security or
electronic information security.
The COVID-19, also known as the coronavirus pandemic, was an
unprecedented event that altered the lives of billions of people globally
and greatly increased the risk of cyber-attacks. The pandemic pushed
organizations to adopt remote working method and forced employees
to work from their homes, which bring new security risks. Due to this
new working model, personnel computing devices have been
extensively utilized for work purposes. Video conferencing tools have
become the primary environment for meeting, reliance on remote
connectivity services, and corporate VPNs have augmented, and cloud
services have justified their usefulness, which generate an increased
risk of data breaches and expose the companies’ critical IT systems to
malicious content.
The biggest data
breaches during
the COVID-19
pandemic
Company Impact
MGM Data
Dump
142 million compromised accounts
CAM4 11 billon records leaked
Easy Jet 9 million compromised accounts and 2200
stolen credit cards
Marriott 5.2 million compromised accounts
Zoom 500000 passwords leaked
Magellan
Health
365000 parents’ record compromised
Nintendo 160000 compromised user accounts
Twitter 130000 public figures and profile targeted by
spear phishing attacks
Antheus
Tecnologia
76000 compromised unique fingerprints,
emails, and personal data
Thank You

More Related Content

PDF
David Derigiotis, Cyber Insurance & Incident Response Conference 2021
PDF
Future of Cyber-security Economy
PDF
Symantec Internet Security Threat Report 2014 - Volume 19
PDF
Palo Alto Networks 2016 Cybersecurity Predictions
PPTX
Cybercrime
PDF
Employee Training in Cybersecurity: 4 Tips and Techniques
PPTX
CyberSecurity.pptx
PDF
Security and Your Business
David Derigiotis, Cyber Insurance & Incident Response Conference 2021
Future of Cyber-security Economy
Symantec Internet Security Threat Report 2014 - Volume 19
Palo Alto Networks 2016 Cybersecurity Predictions
Cybercrime
Employee Training in Cybersecurity: 4 Tips and Techniques
CyberSecurity.pptx
Security and Your Business

What's hot (20)

PPT
eCrime Conference March 2006
PDF
Sholove cyren web security - technical datasheet2
PDF
Emerging web security threats
PPTX
Top 2016 Mobile Security Threats and your Employees
PDF
Business inSecurity
PPTX
Ivanti threat thursday deck july final - read-only
PPTX
Future tech trends keynote for WCO congress, Tbilisi, Georgia, June 2017
PPTX
PPTX
Global Cybersecurity Market (2017 - 2022)
PDF
IRJET- Cybersecurity: The Agenda for the Decade
PPTX
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
PPT
The Effect Of Lack Of Security On Industry
PPTX
lack of security
PPT
The effect-of-lack-of-security-on-industry129
PDF
Cloud service providers in pune
PDF
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
PDF
The Internet of Things – Good, Bad or Just Plain Ugly?
PDF
Protecting Web App
PDF
Mobile malware and enterprise security v 1.2_0
PDF
Cyber security colombo meetup
eCrime Conference March 2006
Sholove cyren web security - technical datasheet2
Emerging web security threats
Top 2016 Mobile Security Threats and your Employees
Business inSecurity
Ivanti threat thursday deck july final - read-only
Future tech trends keynote for WCO congress, Tbilisi, Georgia, June 2017
Global Cybersecurity Market (2017 - 2022)
IRJET- Cybersecurity: The Agenda for the Decade
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
The Effect Of Lack Of Security On Industry
lack of security
The effect-of-lack-of-security-on-industry129
Cloud service providers in pune
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
The Internet of Things – Good, Bad or Just Plain Ugly?
Protecting Web App
Mobile malware and enterprise security v 1.2_0
Cyber security colombo meetup
Ad

Similar to Cyber challenge during this pandemic (20)

PDF
D372326.pdf
PDF
D372326.pdf
PDF
List of data breaches and cyber attacks in january 2022
PPTX
Cyber attacks in 2021
DOCX
Cyber Security.docx
PDF
Cybercrime's accelerated by covid 19 | 2021
PDF
Cybersecurity in Pandemic time.pdf
PDF
How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk Advisory
PDF
Covid 19, How A Pandemic Situation Shapes Cyber Threats
PPTX
U-1.pptx..........................................
PDF
Cyber Ethics Notes.pdf
PPTX
Cybersecurity_Awareness_Presentation.pptx
PPTX
Cyber Security awareness of cyber security
PPTX
What is Cyber & information security.pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Return to office post covid 19
PPTX
Cyber security
PDF
Why cyber-criminals target Healthcare - Panda Security
PDF
Cyber Security Matters a book by Hama David Bundo
PPTX
PPT FOR CYBER SECURITY AND FORENSICS MICRO PROJECT
D372326.pdf
D372326.pdf
List of data breaches and cyber attacks in january 2022
Cyber attacks in 2021
Cyber Security.docx
Cybercrime's accelerated by covid 19 | 2021
Cybersecurity in Pandemic time.pdf
How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk Advisory
Covid 19, How A Pandemic Situation Shapes Cyber Threats
U-1.pptx..........................................
Cyber Ethics Notes.pdf
Cybersecurity_Awareness_Presentation.pptx
Cyber Security awareness of cyber security
What is Cyber & information security.pptx
CYBER-CRIMES AND SECURITY A guide to understanding
Return to office post covid 19
Cyber security
Why cyber-criminals target Healthcare - Panda Security
Cyber Security Matters a book by Hama David Bundo
PPT FOR CYBER SECURITY AND FORENSICS MICRO PROJECT
Ad

Recently uploaded (20)

PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Approach and Philosophy of On baking technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPT
Teaching material agriculture food technology
PDF
Modernizing your data center with Dell and AMD
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Encapsulation theory and applications.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Approach and Philosophy of On baking technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
The AUB Centre for AI in Media Proposal.docx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Teaching material agriculture food technology
Modernizing your data center with Dell and AMD
NewMind AI Monthly Chronicles - July 2025
NewMind AI Weekly Chronicles - August'25 Week I
Reach Out and Touch Someone: Haptics and Empathic Computing
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Empathic Computing: Creating Shared Understanding
Encapsulation theory and applications.pdf
cuic standard and advanced reporting.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf

Cyber challenge during this pandemic

  • 1. Cyber Challenge during this pandemic Partho Kumar Saha
  • 2. Cybersecurity Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security.
  • 3. The COVID-19, also known as the coronavirus pandemic, was an unprecedented event that altered the lives of billions of people globally and greatly increased the risk of cyber-attacks. The pandemic pushed organizations to adopt remote working method and forced employees to work from their homes, which bring new security risks. Due to this new working model, personnel computing devices have been extensively utilized for work purposes. Video conferencing tools have become the primary environment for meeting, reliance on remote connectivity services, and corporate VPNs have augmented, and cloud services have justified their usefulness, which generate an increased risk of data breaches and expose the companies’ critical IT systems to malicious content.
  • 4. The biggest data breaches during the COVID-19 pandemic Company Impact MGM Data Dump 142 million compromised accounts CAM4 11 billon records leaked Easy Jet 9 million compromised accounts and 2200 stolen credit cards Marriott 5.2 million compromised accounts Zoom 500000 passwords leaked Magellan Health 365000 parents’ record compromised Nintendo 160000 compromised user accounts Twitter 130000 public figures and profile targeted by spear phishing attacks Antheus Tecnologia 76000 compromised unique fingerprints, emails, and personal data