COVID-19: The Impact on Global Cyber Security Infrastructures in Organizations

COVID-19: The Impact on Global Cyber Security Infrastructures in Organizations

Niamathulla S. K., Mansi Bhalothia
ISBN13: 9781799891642|ISBN10: 179989164X|ISBN13 Softcover: 9781799891659|EISBN13: 9781799891666
DOI: 10.4018/978-1-7998-9164-2.ch003
Cite Chapter Cite Chapter

MLA

S. K., Niamathulla, and Mansi Bhalothia. "COVID-19: The Impact on Global Cyber Security Infrastructures in Organizations." Cybersecurity Crisis Management and Lessons Learned From the COVID-19 Pandemic, edited by Ryma Abassi and Aida Ben Chehida Douss, IGI Global, 2022, pp. 43-66. https://doi.org/10.4018/978-1-7998-9164-2.ch003

APA

S. K., N. & Bhalothia, M. (2022). COVID-19: The Impact on Global Cyber Security Infrastructures in Organizations. In R. Abassi & A. Ben Chehida Douss (Eds.), Cybersecurity Crisis Management and Lessons Learned From the COVID-19 Pandemic (pp. 43-66). IGI Global. https://doi.org/10.4018/978-1-7998-9164-2.ch003

Chicago

S. K., Niamathulla, and Mansi Bhalothia. "COVID-19: The Impact on Global Cyber Security Infrastructures in Organizations." In Cybersecurity Crisis Management and Lessons Learned From the COVID-19 Pandemic, edited by Ryma Abassi and Aida Ben Chehida Douss, 43-66. Hershey, PA: IGI Global, 2022. https://doi.org/10.4018/978-1-7998-9164-2.ch003

Export Reference

Mendeley
Favorite

Abstract

Cybersecurity is becoming a national issue, and the average cost of a data breach is USD 3.9 billion. CEOs and business owners face the challenge of legal and regulatory compliance when it comes to protecting data against sophisticated cyber threats. The COVID-19 crisis has pushed organizations to quickly adopt digital technologies and shift to remote work models, which means more significant opportunities for hackers to target individuals and enterprises. The MENA region alone suffered from over 9000 new spam messages and advanced malware attacks last year, and criminals exploit psychological vulnerabilities that make victims susceptible to social engineering techniques. This chapter aims to present the latest findings and insights about security vulnerabilities in organizations and show some of the best practices in mitigating threats. The chapter will delve into the different modes of attacks, including tactics cybercriminals take advantage of and what enterprises can do to stay protected from them.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.