The technical challenges brought by COVID-19

April 23, 2020
The panic around the novel coronavirus (COVID-19) continues to result in disruptions rarely seen before in human history. The forefront challenges caused by the virus are certainly with economic and health flavour. However, the millions of people losing their jobs and the tens of thousands of people already killed by the virus are only one part of the problems caused by the disease. With COVID-19 spreading around the globe at rapid rates, hundreds of millions of people have started telecommuting leading to heavy internet traffic. The global bandwidth demand is a test of the internet itself, and it is a cause for trouble for high-tech companies offering remote conferencing services, video streaming providers, online gaming, etc.  

Zoom, an application that provides a remote conferencing service that combines video conferencing solutions, has been receiving tons of negative publicity because of the privacy and security issues uncovered since the world went into quarantine. Even the company CEO publicly admitted that things are far from perfect. The demand for streaming platforms has increased too. YouTube had no other option but to shift default video quality to standard definition amid the sudden increase in traffic caused by hundreds of millions of people thirsty for entertainment. Xbox Live also went down as people were looking for ways to kill some time at the beginning of the quarantine. The sudden increase in social media traffic led to misinformation that continues to spread like wildfire – the Facebook-owned WhatsApp had even to limit message forwarding to counter coronavirus misinformation.

Hackers use the chaos to attack – currently, millions of remote workers are out of their comfort zone and away from the IT support that usually keeps an eye on them while in the office. Zoom’s CEO admitted the company’s privacy and security faults and missteps but also defended the remote conferencing service provider saying that over the last few weeks, Zoom’s popularity has brought types of users whose backgrounds are significantly different than the company’s general userbase.

Up until the end of January, Zoom’s most active user crowd mainly consisted of enterprise customers with seasoned IT teams. He called the newcomers “very different,” implying that those are the type of people who are not as technology savvy and are people who may be more susceptible to cyber-attacks. Zoom verified accounts are continuously appearing on the dark web. In some cases, hackers do not even look for monetary compensation. They make the stolen information (email addresses, passwords, meeting IDs, host keys, and names) available to everyone so others can 'troll' the meetings.

If you are working from home, especially if you are using personal equipment, you have to make sure that your device is protected with reliable endpoint protection software – the last thing you want is to compromise company privacy or somehow be the cause for a company data breach.

Book a Free Cyber Clinic today to see how we can Defend Your Business.
Book a Free Cyber Clinic
Enquire today to see how we can find out if your emails or accounts have been compromised!
Call Us

Follow Us

Be the first to know

You might also like

October 14, 2024
DevOps is a popular practice, especially among large organizations. However, while it comes with numerous benefits, it presents numerous risks as well. One notable challenge is the increased velocity of deployment, which often complicates how developers implement and ensure application security throughout the development and deployment process. DevOps is a popular practice, especially among large organizations. However, while it comes with numerous benefits, it presents numerous risks as well. One notable challenge is the increased velocity of deployment, which often complicates how developers implement and ensure application security throughout the development and deployment process. According to a recent survey, almost 80% of CIOs expressed concerns about the difficulty of discerning trusted elements from untrusted ones within DevOps environments. In particular, the pressure to deliver services at a faster pace sometimes prompts DevOps teams to take security shortcuts, resulting in potentially costly repercussions. These include data breaches, application downtime, and compliance violations.  So, how can you strike a balance between the demand for agile DevOps practices and the need to maintain robust security measures?
October 4, 2024
Testing applications for security flaws during production is a vital process of the development lifecycle, and this is where Dynamic Application Security Testing (DAST) comes in. DAST is a security testing approach in application security (AppSec), in which testers assess an application in real-time, while it’s actively running. This process can be conducted even without testers knowing the application’s internal interactions or system-level designs. Applications fuel the engine of the world’s economy, but enterprises can encounter substantial hurdles when striving to retain a competitive advantage in a rapidly changing digital landscape. Businesses must continuously pursue inventive solutions, even as they contend with sophisticated adversaries looking to exploit opportunities to disrupt operations, compromise vital information, and inflict harm. According to recent research, approximately 17% of cyberattacks aim to exploit vulnerable web applications. Yet, 98% of web applications are susceptible to attacks that can lead to malware infection or redirect users to malicious websites. All the while, 72% of these vulnerabilities result from coding errors. Testing applications for security flaws during production is a vital process of the development lifecycle, and this is where Dynamic Application Security Testing (DAST) comes in. DAST is a security testing approach in application security (AppSec), in which testers assess an application in real-time, while it’s actively running. This process can be conducted even without testers knowing the application’s internal interactions or system-level designs.  This is because DAST tools operate without access to the application’s source code. Instead, they emulate genuine attacks, akin to those carried out by real hackers, to identify security weaknesses. This “black box” testing method examines the application from an external perspective, scrutinises its runtime behaviour, and observes how it reacts to simulated attacks. These simulations help evaluate whether the application exhibits vulnerabilities and if it is potentially susceptible to malicious attacks.
September 25, 2024
In this blog post we look back at the origin of the term “hacking”, as well as how activities that might be described as hacking have existed throughout history, even prior to the advent of computer systems – and what if anything these can teach us today. Hacking is attacking and breaking into computer systems illegally… isn’t it? The meaning of the term “hacking” has in fact changed substantially over time, morphing from describing essentially benign (or at worst mildly disruptive) activities into its modern attribution to largely criminal and illegal activities. What’s more, in its original usage, “hacking” doesn’t necessarily even need to involve computer systems at all.  In this blog post we look back at the origin of the term “hacking”, as well as how activities that might be described as hacking have existed throughout history, even prior to the advent of computer systems – and what if anything these can teach us today.
More Posts
Share by: