TIMELINE: COVID-19 IMPACT
ON CYBERSECURITY
Expert insight on best practices to take now and in the future.
Updated Wednesday, May 6
Share:
Upcoming Events
Cybersecurity Predictions
Jump to Month
May
2020
Jun
2020
Jul
2020
Aug
2020
Sep
2020
Oct
2020
Nov
2020
Dec
2020
Jan
Feb
Mar
Apr
Dec
2019
Jan
2020
Feb
2020
Mar
2020
Apr
2020
More Predictions
Register
APRIL
COVID-19 Events
Cybersecurity Impact
Take the time to set up a good working environment. What are the key components you should make sure you have.
4/7/20
Fake Zoom installers identified which bundle legitimate installer with malware.
source: Bleeping Computer
4/3/20
CFOs plan to permanently shift significant numbers of employees to work remotely.
source: Forbes
4/4/20
COVID-19 case count tops 1 million.
source: WHO Timeline - COVID-19
Address your short-term surge needs while building long-term expertise.
4/1/20
Microsoft warns hospitals about the risks of ransomware attacks due to insecure VPN devices and gateways.
source: Microsoft
MARCH
COVID-19 Events
Cybersecurity Impact
Institute a mandatory update policy on mobile devices that access your network.
3/20/20
FBI Internet Crime Complaint Center warns of a rise in fraud due to COVID-19, including fake CDC emails, phishing attempts and counterfeit treatments and equipment.
source: IC3
3/11/20
WHO declares COVID-19 a Pandemic.
source: WHO Timeline - COVID-19
75-80%
Work from home numbers skyrocket. What to think about to protect your network.
3/9/20
Reason Labs researcher identifies a malicious "Coronavirus map" app using AZORult to steal information and download additional malware.
source: Reason Security
Address your short-term surge needs while building long-term expertise.
3/1/20
Microsoft warns hospitals about the risks of ransomware attacks due to insecure VPN devices and gateways.
source: Source goes here
Use security software on all computers in the organization.
Protect your accounts by using multi-factor authentication.
1
2
3
How to Avoid Phishing Scams
FEBRUARY
COVID-19 Events
Cybersecurity Impact
Take the time to set up a good working environment. What are the key components you should make sure you have.
2/29/20
First recorded COVID-19 death in the US.
source: CDC
2/2/20
Nation-state actors reported to use COVID-themed lures
source: ZDNet
Criminals Pretend to be WHO
Suspicious email messages appearing to be from WHO attempt to take advantage of the COVID-19 emergency.
2/15/20
WHO Director General calls on the international community to stand together at the Munich Security Conference.
source: WHO, Rolling updates on coronavirus disease (COVID-19)
Address your short-term surge needs while building long-term expertise.
4/1/20
Microsoft warns hospitals about the risks of ransomware attacks due to insecure VPN devices and gateways.
source: Source goes here
A VPN rationing schedule can be established where employees are either directed or restricted to access the VPN during known windows based on their job function.
WFH numbers shift from ~10% to 80%. Create a VPN Rationing Schedule
2/28/20
RSA conference proceeds as planned despite some large companies (including IBM, AT&T and Verizon) pulling out at the last moment.
source: RSA Conference
1/29/20
MUMMY SPIDER distributes Emotet malware via Japanese-language spam mimicking a public health center.
source: Crowdstrike
1/30/20
COVID-19 outbreak is declared a public health emergency of international concern.
source: WHO Timeline - COVID-19
1/21/20
First reported case in the US.
source: The New England Journal of Medicine
1/13/20
First case of COVID-19 outside of China confirmed in Thailand.
source: WHO Timeline - COVID-19
1/9/20
First reported death from COVID-19.
source: New York Times
1/7/20
Chinese researchers identify a novel coronavirus, later named COVID-19.
source: World Health Organization
Follow these tips to create a good work from home (WFH) environment for yourself. Learn more from a WFH veteran, who offers tips on maximizing productivity while promoting physical and emotional well-being.
See Details
In times of need or crisis, it can be challenging to know who to turn to for extra support. External staffing and technology can ensure immediate, short-term business continuity or be used to help you build your in-house expertise.
See Details
Surge Support
This paper explores the broad sets of technology challenges we are observing today and offers potential solutions for key areas of security concern.
COVID-19: Overcoming an Abundance of Cybersecurity Caution
See Details
Is Cybersecurity Virus Resistant?
Optiv and Momentum Cyber have partnered for an on-demand webinar that shines light on COVID's impact to cybersecurity.
Learn more about the three near-term phases we expect to see in the cybersecurity space.
We predict how the stimulus bill will affect investment in cybersecurity and new technology.
Curious about pre-COVID predictions? See what experts in 2019 anticipated for 2020.
The Top Six Cybersecurity Trends for 2020
JANUARY
COVID-19 Events
Cybersecurity Impact
May 7: Join us for OptivCon Virtual, a complimentary summit where you’ll learn how to reduce enterprise risk and realize stronger, simpler and less costly cybersecurity programs.
Harden Your Security Operations
Train staff on current lures, disable downloads/redirects contained in emails and use multi-factor authentication on accounts.
4/16/20
Google blocks 18 million COVID-related malware and phishing emails per day over the previous week.
source: Talos Intelligence
Security Hardening
Checklist
This checklist provides actionable steps security teams can take toward achieving short and long-term priorities.
See Details
COVID-19: Hardening Security Operations
DECEMBER
COVID-19 Events
Cybersecurity Impact
12/31/19
A pneumonia case of unknown cause in Wuhan, China is reported to the WHO.
CHECK BACK FOR UPDATES
Learn more about the three near-term phases we expect to see in the cybersecurity space. This a segment from the recorded webinar, "Is Cybersecurity Virus Resistant? Click below to view full webinar.
COVID-19: Overcoming an Abundance of Cybersecurity Caution
View Webinar
We predict how the stimulus bill will affect investment in cybersecurity and new technology. You're viewing a segment from the recorded webinar, "Is Cybersecurity Virus Resistant? Click below to view full webinar.
COVID-19: Overcoming an Abundance of Cybersecurity Caution
View Webinar
As 2019 came to a close, we presented our ideas on what threats the industry would face – and not just ransomware and phishing attacks, but new, hard-to-combat threats.
The Top Six Cybersecurity Trends for 2020
See Details
Half of America is Working From Home
Work from home numbers skyrocket. What to think about to protect your network.
Work from home numbers skyrocket. What to think about to protect your network. You're viewing a segment from the recorded webinar, "Is Cybersecurity Virus Resistant? Click below to view full webinar.
COVID-19: Overcoming an Abundance of Cybersecurity Caution
View Webinar
source: WHO Timeline - COVID-19
"Expect a significant increase in ransomware attacks against municipalities and educational systems as their attention is not on security and their attack surface has grown significantly due to work from home."
Bradley Rager
Optiv Chief of Staff, SVP Strategic Execution
"There will be increased demand for cybersecurity education as people look to pivot into more resilient industries with longer term growth potential."
Bradley Rager
Optiv Chief of Staff, SVP Strategic Execution
Committed to helping you stay secure during COVID-19.
Click here to learn more
source: WHO
source: https://www.optiv.com/blog/22-ways-protect-yourself-against-phishing-attacks
Organizations are rushing to enable remote access for their staff as many cities, counties and states move towards a shelter-in-place mandate.
Approximately 10% of workers worked from home before COVID
Cybersecurity Must be C-suite Business
"...CEOs, corporate board members, CISOs, and other executives have to make cybersecurity 'C-suite business' in order to ensure their companies secure what they have, while enabling continuous business and operational change and keeping pace with ever-changing threats in order to identify and thwart would-be hackers and respond rapidly to malicious activity."
General David Petraeus
United States Army (Retired)
Partner, KKR
Chairman, KKR Global Institute
Optiv Board Member
source: https://www.optiv.com/blog/2019-cyber-threat-intelligence-estimate-security-must-be-strategic
Dan Burns
Optiv Executive Advisor & Board Member
Todd Weber
Optiv CTO, Americas
Dave DeWalt
Founder and Chairman, Momentum Cyber and Optiv Board Member
CHECK BACK FOR UPDATES
Committed to helping you stay secure during COVID-19.
Click here to learn more
12/31/19
A pneumonia case of unknown cause in Wuhan, China is reported to the WHO.
source: WHO Timeline - COVID-19
Cybersecurity
Impact
COVID-19 Events
DECEMBER
1/7/20
Chinese researchers identify a novel coronavirus, later named COVID-19.
source: World Health Organization
1/11/20
First reported death from COVID-19.
source: New York Times
1/13/20
First case of COVID-19 outside of China confirmed in Thailand.
source: WHO Timeline - COVID-19
1/21/20
First reported case in the US.
source: The New England Journal of Medicine
Curious about pre-COVID predictions? See what experts in 2019 anticipated for 2020.
The Top Six Cybersecurity Trends for 2020
Organizations are rushing to enable remote access for their staff as many cities, counties and states move towards a shelter-in-place mandate.
~10% of workers worked from home before COVID
1/29/20
MUMMY SPIDER distributes Emotet malware via Japanese-language spam mimicking a public health center.
source: Crowdstrike
1/30/20
COVID-19 outbreak is declared a public health emergency of international concern.
source: WHO Timeline - COVID-19
Cybersecurity
Impact
COVID-19 Events
JANUARY
2/2/20
Nation-state actors reported to use COVID-themed lures.
source: ZDNet
Cybersecurity Must be C-suite Business
"...CEOs, corporate board members, CISOs, and other executives have to make cybersecurity 'C-suite business' in order to ensure their companies secure what they have, while enabling continuous business and operational change and keeping pace with ever-changing threats in order to identify and thwart would-be hackers and respond rapidly to malicious activity."
General David Petraeus
United States Army (Retired)
Partner, KKR
Chairman, KKR Global Institute
Optiv Board Member
source: www.optiv.com/blog
Criminals Pretend to be WHO
Suspicious email messages appearing to be from WHO attempt to take advantage of the COVID-19 emergency.
2/15/20
WHO Director General calls on the international community to stand together at the Munich Security Conference.
source: WHO, Rolling updates on coronavirus disease (COVID-19)
2/28/20
RSA conference proceeds as planned despite some large companies (including IBM, AT&T and Verizon) pulling out at the last moment.
source: RSA Conference
2/29/20
First recorded COVID-19 death in the US.
source: CDC
Cybersecurity
Impact
COVID-19 Events
FEBRUARY
A VPN rationing schedule can be established where employees are either directed or restricted to access the VPN during known windows based on their job function.
WFH numbers shift from ~10% to 80%
Is Cybersecurity Virus-Resistant?
Optiv and Momentum Cyber have partnered for an on-demand webinar that shines light on COVID's impact to cybersecurity.
3/9/20
Reason Labs researcher identifies a malicious "Coronavirus map" app using AZORult to steal information and download additional malware.
source: Reason Security
3/11/20
WHO declares COVID-19 a Pandemic.
source: WHO Timeline - COVID-19
Institute a mandatory update policy on mobile devices that access your network.
Use security software on all computers in the organization.
Protect your accounts by using multi-factor authentication.
1
2
3
How to Avoid Phishing Scams
source: https://www.optiv.com/blog/22-ways-protect-yourself-against-phishing-attacks
3/20/20
FBI Internet Crime Complaint Center warns of a rise in fraud due to COVID-19, including fake CDC emails, phishing attempts and counterfeit treatments and equipment.
source: IC3
Cybersecurity
Impact
COVID-19 Events
MARCH
Address your short-term surge needs while building long-term expertise.
4/1/20
Microsoft warns hospitals about the risks of ransomware attacks due to insecure VPN devices and gateways.
source: Microsoft
4/4/20
COVID-19 case count tops 1 million.
source: WHO Timeline - COVID-19
Work from home numbers skyrocket. What to think about to protect your network.
Half of America is Working From Home
4/3/20
CFOs plan to permanently shift significant numbers
of employees to work remotely.
source: Forbes
Take the time to set up a good working environment. What are the key components you should make sure you have.
4/7/20
source: Bleeping Computer
Fake Zoom installers identified which bundle legitimate installer with malware.
Security Hardening
Checklist
Harden Your Security Operations
Train staff on current lures, disable downloads/redirects contained in emails and use multi-factor authentication on accounts.
4/16/20
Google blocks 18 million COVID-related malware and phishing emails per day over the previous week.
source: Talos Intelligence
Cybersecurity
Impact
COVID-19 Events
APRIL
Work from home numbers skyrocket. What to think about to protect your network. You're viewing a segment from the recorded webinar, "Is Cybersecurity Virus Resistant? Click below to view full webinar.
Todd Weber
Optiv CTO, Americas
View Webinar
This checklist provides actionable steps security teams can take toward achieving short-and long-term priorities.
COVID-19: Hardening Security Operations
See Details
Work from home (WFH). It does take time to adjust. A WFH veteran offers tips on maximizing productivity while promoting physical and emotional well-being.
See Details
In times of need or crisis, it can be challenging to know who to turn to for extra support. External staffing and technology can ensure immediate, short-term business continuity or be used to help you build your in-house expertise.
Optiv Surge Support
See Details
This paper explores the broad sets of technology challenges we are observing today and offers potential solutions for key areas of security concern.
COVID-19: Overcoming an Abundance of Cybersecurity Caution
See Details
As 2019 came to a close, we presented our ideas on what threats the industry would face – and not just ransomware and phishing attacks, but new, hard-to-combat threats.
The Top Six Cybersecurity Trends for 2020
See Details
"There will be increased demand for cybersecurity education as people look to pivot into more resilient industries with longer term growth potential."
Bradley Rager
Optiv Chief of Staff, SVP Strategic Execution
More Predictions
"Expect a significant increase in ransomware attacks against municipalities and educational systems as their attention is not on security and their attack surface has grown significantly due to work from home."
Bradley Rager
Optiv Chief of Staff, SVP Strategic Execution
More Predictions
We predict how the stimulus bill will affect investment in cybersecurity and new technology.
More Predictions
Learn more about the three near-term phases we expect to see in the cybersecurity space.
More Predictions
Predictions
Learn more about the three near-term phases we expect to see in the cybersecurity space. This a segment from the recorded webinar, "Is Cybersecurity Virus Resistant? Click below to view full webinar.
Dan Burns
Optiv Executive Advisor & Board Member
View Webinar
We predict how the stimulus bill will affect investment in cybersecurity and new technology. You're viewing a segment from the recorded webinar, "Is Cybersecurity Virus Resistant? Click below to view full webinar.
COVID-19: Overcoming an Abundance of Cybersecurity Caution
View Webinar
View Webinar
Dave DeWalt
Founder and Chairman, Momentum Cyber and Optiv Board Member
Predictions
Register
May 7: Join us for OptivCon Virtual, a complimentary summit where you’ll learn how to reduce enterprise risk and realize stronger, simpler and less costly cybersecurity programs.
Upcoming Events
Upcoming Events
Jump to Month
Dec
2019
Jan
2020
Feb
2020
Mar
2020
Apr
2020
May
2020
Jun
2020
Jul
2020
Aug
2020
Sep
2020
Dec
2020
Nov
2020
Oct
2020
TIMELINE:
COVID-19 IMPACT ON CYBERSECURITY
Expert insight on best practices to take now and in the future.
Updated Wednesday, May 6th
Share:
MAY
COVID-19 Events
Cybersecurity Impact
Recognize
One must be aware to avoid the snare.
source: https://www.optiv.com/blog/five-rs-phishing
Review
One must look beyond the lines and see the signs.
Read
One must give a thorough look to avoid the hook.
1
2
3
The Five R's of Phishing Scams
5/01/20
Macy's announces they will reopen 68 stores in states which have lifted restrictions. With state and local approval and improvement in COVID-19 rates, they plan to reopen the rest of their 775 stores by mid-June.
source: USA Today
3/11/20
WHO declares COVID-19 a Pandemic.
source: WHO Timeline - COVID-19
75-80%
Work from home numbers skyrocket. What to think about to protect your network.
3/9/20
Reason Labs researcher identifies a malicious "Coronavirus map" app using AZORult to steal information and download additional malware.
source: Reason Security
Address your short-term surge needs while building long-term expertise.
3/1/20
Microsoft warns hospitals about the risks of ransomware attacks due to insecure VPN devices and gateways.
source: Source goes here
A VPN rationing schedule can be established where employees are either directed or restricted to access the VPN during known windows based on their job function.
WFH numbers shift from ~10% to 80%. Create a VPN Rationing Schedule
OPTIV/CON
Virtual
4
5
React
One must slow phishing traction with the appropriate action.
Report
One must share to clear the air.
Security Hardening
Checklist
Harden Your Security Operations
Train staff on current lures, disable downloads/redirects contained in emails and use multi-factor authentication on accounts.
4/30/20
Several phishing campaigns were discovered in the last week of April, leveraging the Family and Medical Leave Act, small business disaster relief funds and parcel delivery services to deliver malware.
source: Securityintelligence.com
Recognize
One must be aware to avoid the snare.
React
One must slow phishing traction with the appropriate action.
Report
One must share to clear the air.
source: https://www.optiv.com/
blog/five-rs-phishing
Review
One must look beyond the lines and see the signs.
Read
One must give a thorough look to avoid the hook.
1
2
3
4
5
The Five R's of Phishing Scams
Pre-Recorded Webinar: Learn how to reduce enterprise risk and realize stronger, simpler cybersecurity programs.
Cybersecurity
Impact
COVID-19 Events
Job hunting during a pandemic? Here are our predictions for the cybersecurity space.
Hear our predictions for cybersecurity job hunters during a pandemic. For more predictions on COVID's effect on the cybersecurity sector, watch the webinar, "Is Cybersecurity Virus Resistant?"
Barry MacLaughlin
Senior Director of Talent Acquisition
COVID-19: Overcoming an Abundance of Cybersecurity Caution
View Webinar
Hear our predictions for cybersecurity job hunters during a pandemic. For more predictions on COVID's effect on the cybersecurity sector, watch the webinar, "Is Cybersecurity Virus Resistant?"
Barry MacLaughlin
Senior Director of Talent Acquisition
View Webinar
Job hunting during a pandemic? Here are our predictions for the cybersecurity space.
More Predictions