SlideShare a Scribd company logo
Cyber
Security
Learnings
from COVID
Anti-Virus (AV)
Mask
Use masks = Deploy AV on all devices
Wear mask correctly = Configure AV properly
Discard old/dirty masks = Update AV, Keep fresh
rohit11.com
Clean Devices
Sanitization
Sanitize hand = Scan USB devices
Regular cleansing = Periodic system scanning
Keep home clean = Apply software patches
rohit11.com
Network Segmentation
Social
Distancing
Segregate devices into different VLANs
Try Micro-segmentation
Will keep infection from spreading
rohit11.com
Isolation
Quarantine
Quarantine self
when infected
=
Isolate malware
affected devices
Isolation must be carried out in a secure, restricted
physically separate VLAN/network segment.
rohit11.com
Endpoint Detection & Response (EDR)
Vaccination
Vaccine efficacy is
not 100%
=
EDR efficacy is
not 100%
Both reduce chance of ICU/deathbed type situation.
Both drastically reduce effect of potential infections.
rohit11.com
Professional Support
Doctors
Self medication = Self service security
Talk to doctor = Talk to security expert
Best Approach: Let the experts handle the situation.
rohit11.com
Security Assessment
RT-PCR
Rapid Antigen
Blood Test = Vulnerability Assessment
Swab Test = Penetration Testing
Best Approach: Conduct routine security scans on
devices and network to proactively identify issues.
rohit11.com
Cyber Security Awareness
Symptoms
Knowledge
Medical Awareness = Security Awareness
Awareness can protect you in both.
Stay away from fake news though J
rohit11.com
Incident Management Plan
rohit11.com
Plan for care
Covid Plan = Incident management Plan
Medical Insurance = Cyber Insurance
Best Approach: Well designed plans will recover
business operations with minimal downtime.
Failing to plan is Planning to fail !
Containment
rohit11.com
Lockdown
No person enters or
exits
=
No traffic enters or
exits
Only highly important traffic allowed
Containment zone = IT / OT segregation
Total segregation of network segment prevents
infection and data breach. IT/OT environments
benefit the most from this.
Stay Cyber Safe
(as well)
rohit@rohit11.com
@rohit11 rohit11.com

More Related Content

PPTX
Ivanti Threat Thursday - 5 Things to Consider For a Remote Workforce
PPT
Covid 19 staying cyber secure
PDF
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
PDF
10 Tips to Keep Criminals Out
PDF
Preventing zero day cyber attacks
PDF
How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk Advisory
PDF
Covid 19, How A Pandemic Situation Shapes Cyber Threats
PDF
computer viruses and security and preventive measures
Ivanti Threat Thursday - 5 Things to Consider For a Remote Workforce
Covid 19 staying cyber secure
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
10 Tips to Keep Criminals Out
Preventing zero day cyber attacks
How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk Advisory
Covid 19, How A Pandemic Situation Shapes Cyber Threats
computer viruses and security and preventive measures

Similar to Cybersecurity learnings from COVID (20)

PDF
Inforgraphic: Risk Management Recommendations for Covid-19 by CISA
PDF
IET India cybersecurity advisory: security practices for remote working
PPTX
COVID-19 Healthcare Cybersecurity: Best Practices for a Remote Workforce
PDF
Glasswall - How to Prevent, Detect and React to Ransomware incidents
PDF
WFH Cybersecurity Basics Employees and Employers
PDF
BEST CYBER SECURITY PRACTICES
PDF
Cybersecurity During the COVID Era
PDF
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19
PPTX
Data Protection & Privacy During the Coronavirus Pandemic
DOCX
5 Ways to Be Vigilant for your Medical Devices from a Cybersecurity Perspective
PPTX
How cybercrime affects small business
PDF
Cyber attacks during COVID-19 Era
PDF
Covid Tips and tricks
PDF
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
PPTX
How to Perform Continuous Vulnerability Management
PDF
FixNix vCISO CyberSecurity Network Security for Covid91
PPTX
Cybersecurity Training for Nonprofits
PPTX
Scottish Rite Security Presentation.pptx
PDF
Cisa ransomware guide
Inforgraphic: Risk Management Recommendations for Covid-19 by CISA
IET India cybersecurity advisory: security practices for remote working
COVID-19 Healthcare Cybersecurity: Best Practices for a Remote Workforce
Glasswall - How to Prevent, Detect and React to Ransomware incidents
WFH Cybersecurity Basics Employees and Employers
BEST CYBER SECURITY PRACTICES
Cybersecurity During the COVID Era
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19
Data Protection & Privacy During the Coronavirus Pandemic
5 Ways to Be Vigilant for your Medical Devices from a Cybersecurity Perspective
How cybercrime affects small business
Cyber attacks during COVID-19 Era
Covid Tips and tricks
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
How to Perform Continuous Vulnerability Management
FixNix vCISO CyberSecurity Network Security for Covid91
Cybersecurity Training for Nonprofits
Scottish Rite Security Presentation.pptx
Cisa ransomware guide
Ad

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Electronic commerce courselecture one. Pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Cloud computing and distributed systems.
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
MYSQL Presentation for SQL database connectivity
Unlocking AI with Model Context Protocol (MCP)
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Network Security Unit 5.pdf for BCA BBA.
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Understanding_Digital_Forensics_Presentation.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
cuic standard and advanced reporting.pdf
Electronic commerce courselecture one. Pdf
Spectroscopy.pptx food analysis technology
Encapsulation_ Review paper, used for researhc scholars
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
sap open course for s4hana steps from ECC to s4
Cloud computing and distributed systems.
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Ad

Cybersecurity learnings from COVID