在全球大流行期间练习网络卫生的六个实用技巧

Kimberly Peretti, Amy Mushahwar, Jon Knight
{"title":"在全球大流行期间练习网络卫生的六个实用技巧","authors":"Kimberly Peretti, Amy Mushahwar, Jon Knight","doi":"10.1108/joic-08-2020-0017","DOIUrl":null,"url":null,"abstract":"\nPurpose\nDiscusses the long-term cybersecurity challenges businesses face as COVID-19 cases spike and remote work environments need to remain operational, scalable, and capable of flexing with cycles of virus resurgence.\n\n\nDesign/Methodology/Approach\nDiscusses the target-rich environment cybercriminals have during this time, and steps businesses should take to secure their environments and raise employee awareness as more devices are being used remotely for company business and more company data is being sent, located, or stored outside the protections of the company infrastructure.\n\n\nFindings\nThe remote work environment is likely to be around for the foreseeable future and businesses need to ensure they are secured for long-term success.\n\n\nPractical implications\nThe authors offer information security and IT teams practical ways businesses can keep their systems secure and functioning: (1) Consider Basic Cyberhygiene; (2) Identify Security Blind Spots; (3) Review and Update Business Continuity, Disaster Recovery, and Incident Response Plans; (4) Remain Vigilant for Scams and Phishing Attacks; (5) Be Aware of Applicable Industry-Specific Guidelines; (6) Revisit Risk Exceptions.\n\n\nOriginality/Value\nPractical guidance from experienced data privacy and cybersecurity lawyers in response to COVD-19 for Information Security, IT, and business management teams.\n","PeriodicalId":399186,"journal":{"name":"Journal of Investment Compliance","volume":"7 5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Six practical tips for practicing cyberhygiene in the middle of a global pandemic\",\"authors\":\"Kimberly Peretti, Amy Mushahwar, Jon Knight\",\"doi\":\"10.1108/joic-08-2020-0017\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\\nPurpose\\nDiscusses the long-term cybersecurity challenges businesses face as COVID-19 cases spike and remote work environments need to remain operational, scalable, and capable of flexing with cycles of virus resurgence.\\n\\n\\nDesign/Methodology/Approach\\nDiscusses the target-rich environment cybercriminals have during this time, and steps businesses should take to secure their environments and raise employee awareness as more devices are being used remotely for company business and more company data is being sent, located, or stored outside the protections of the company infrastructure.\\n\\n\\nFindings\\nThe remote work environment is likely to be around for the foreseeable future and businesses need to ensure they are secured for long-term success.\\n\\n\\nPractical implications\\nThe authors offer information security and IT teams practical ways businesses can keep their systems secure and functioning: (1) Consider Basic Cyberhygiene; (2) Identify Security Blind Spots; (3) Review and Update Business Continuity, Disaster Recovery, and Incident Response Plans; (4) Remain Vigilant for Scams and Phishing Attacks; (5) Be Aware of Applicable Industry-Specific Guidelines; (6) Revisit Risk Exceptions.\\n\\n\\nOriginality/Value\\nPractical guidance from experienced data privacy and cybersecurity lawyers in response to COVD-19 for Information Security, IT, and business management teams.\\n\",\"PeriodicalId\":399186,\"journal\":{\"name\":\"Journal of Investment Compliance\",\"volume\":\"7 5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Investment Compliance\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1108/joic-08-2020-0017\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Investment Compliance","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1108/joic-08-2020-0017","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

目的讨论企业面临的长期网络安全挑战,因为COVID-19病例激增,远程工作环境需要保持可操作性、可扩展性,并能够随病毒复发周期而灵活应变。设计/方法/方法讨论了在此期间网络犯罪分子所处的目标丰富的环境,以及随着越来越多的设备被远程用于公司业务,越来越多的公司数据被发送、定位或存储在公司基础设施保护之外,企业应该采取哪些措施来保护环境并提高员工的意识。在可预见的未来,远程工作环境很可能会存在,企业需要确保远程工作环境能够获得长期成功。实际意义作者为信息安全和IT团队提供了企业保持系统安全和功能的实用方法:(1)考虑基本网络卫生;(2)识别安全盲点;(3)审查和更新业务连续性、灾难恢复和事件响应计划;(4)警惕诈骗和网络钓鱼攻击;(5)了解适用的行业特定指南;(6)重新审视风险例外。创意/价值经验丰富的数据隐私和网络安全律师为信息安全、IT和业务管理团队应对covid -19提供实用指导。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Six practical tips for practicing cyberhygiene in the middle of a global pandemic
Purpose Discusses the long-term cybersecurity challenges businesses face as COVID-19 cases spike and remote work environments need to remain operational, scalable, and capable of flexing with cycles of virus resurgence. Design/Methodology/Approach Discusses the target-rich environment cybercriminals have during this time, and steps businesses should take to secure their environments and raise employee awareness as more devices are being used remotely for company business and more company data is being sent, located, or stored outside the protections of the company infrastructure. Findings The remote work environment is likely to be around for the foreseeable future and businesses need to ensure they are secured for long-term success. Practical implications The authors offer information security and IT teams practical ways businesses can keep their systems secure and functioning: (1) Consider Basic Cyberhygiene; (2) Identify Security Blind Spots; (3) Review and Update Business Continuity, Disaster Recovery, and Incident Response Plans; (4) Remain Vigilant for Scams and Phishing Attacks; (5) Be Aware of Applicable Industry-Specific Guidelines; (6) Revisit Risk Exceptions. Originality/Value Practical guidance from experienced data privacy and cybersecurity lawyers in response to COVD-19 for Information Security, IT, and business management teams.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信