Learning from COVID-19: Security and Continuity Planning

Remote working challenges


  • Does your organization have enough VPN access?
  • Does the organization have enough devices to conduct day-to-day operations?
  • Do you have enough finances to sustain all remote operations?
  • Is any form of training required?
  • Do your employees have the required internet access?
  1. Be clear about expectations and responsibilities: We have low face-to-face interactions with the employees, it becomes difficult to communicate the right expectations out of any project. The internet is impacted due to rains and high usability, it sometimes becomes extremely difficult to maintain consistency. Regular follow ups and dashboards for projects help in maintaining efficiency and clarity with deadlines.
  2. Create an awareness about the importance of being cyber secure: There has been an increase in spam and phishing attacks during COVID-19 pandemic which has made employees vulnerable to attacks. Hackers use these techniques to manipulate your employees and access your network. As an organization, you should encourage employees to communicate about such attacks or even let their managers know if they get a hint as well.
  3. VPN accessibility: VPNs mask your internet protocol (IP) address so your online actions are virtually untraceable. Most important, VPN services establish secure and encrypted connections to provide greater privacy than even a secured Wi-Fi hotspot.This directly helps individuals and businesses to send and receive data security over the internet.
  4. Use of DNS Filtering — Keeping users safe as they navigate the Internet is more difficult when they are connecting from outside of your network. With employees stuck at home, chances are good that company laptops will be used for a hefty amount of personal web surfing and email checking. Cloud-based DNS filtering makes it possible to block connections and limit access to the risky areas of the Internet. Clicks on malicious links or attempts to connect to domains related to phishing and malware can be prevented, without having to use a VPN.




The “Open” Big Data Analytics platform that offers solutions to the world’s most challenging cyber security problems with real-time data analytics.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

The USB-C Cheat Sheet

Cherri leads the charge for EMV® 3D Secure 2.0 adoption

Vulnerability Management is the Key to Stopping Attacks

Vulnerability Management

Your Social Security Number Has Already Been Hacked. Why Do We Still Have Them?

What happens when you enter a URL in your browser?

GDPR — Everything You Always Wanted to Know (But Were Afraid to Ask)

How to Effectively Block Porn


Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


The “Open” Big Data Analytics platform that offers solutions to the world’s most challenging cyber security problems with real-time data analytics.

More from Medium

My Opinion on Chrome Books

One simple idea that revolutionise socialising

An Outsider’s View of the Problems That Netflix Faces

Three Pillars of Single-Path Coding