BOOK AN APPOINTMENT WITH AN IT SPECIALIST TODAY

[VIDEO] COVID-19 (Corona Virus): Business Continuity Plan Ready?

Coronavirus Spreading: Make Sure Your Business Continuity Plan Is Ready

The spread of COVID-19 (coronavirus) has taken root across the country. More and more locations are starting to report cases and this number continues to raise alarm bells throughout the medical profession, and unsurprisingly, across businesses everywhere.



Business Continuity During Crisis

In the video above, We shared with you the importance of making sure your business continuity strategies are in place and ready to go. Many of the largest global enterprises to local small businesses have begun to exercise and test business continuity strategies in the event that their offices and factories are shut down due to the spread of this virus – forcing staff members to work remotely to keep the business functioning.

Are you prepared in the event that your employees need to stay home due to quarantine or a similar occurrence? If not, we urge you to reach out to us to talk about setting up:

  1. Remote access solutions that let your team work from home with access to data, applications, and systems.
  2. Communication solutions that enable anytime, anywhere communication via the internet from any device or location.
  3. Cybersecurity solutions for office and home computers that keep you safe against cybercriminals leveraging this major headline as a mechanism of social engineering.
  4. Emergency procedures that outline how to recover equipment, emergency contact information for employees, and more.
  5. Virtual private network (VPN) technology to ensure your employees are using a secure, encrypted connection at home to access corporate information.

Systems MUST be in place for employees working from home as they’re using their own computers to access corporate resources. It’s up to you to make sure those computers are clean from viruses or other security issues.

Our team is more than familiar with creating proven contingency plans for situations like this. You don’t have to handle this difficult situation alone. We can help you get prepared and make sure your employees are accessing corporate information in a safe and secure manner.

Reach out to us right away over the phone, by email or by visiting our website.

COVID-19 Business Continuity

More Like This

AA20-266A: LokiBot Malware

Original release date: September 22, 2020 Summary This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise frameworks for all referenced threat actor techniques. This product was written by the Cybersecurity and Infrastructure Security Agency (CISA) with contributions by the Multi-State Information Sharing & Analysis Center (MS-ISAC). …

AA20-266A: LokiBot Malware Read More »

Read More

AA20-259A: Iran-Based Threat Actor Exploits VPN Vulnerabilities

Original release date: September 15, 2020 Summary This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques. This product was written by the Cybersecurity and Infrastructure Security Agency (CISA) with contributions from the Federal Bureau of Investigation (FBI). CISA and …

AA20-259A: Iran-Based Threat Actor Exploits VPN Vulnerabilities Read More »

Read More

AA20-258A: Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity

Original release date: September 14, 2020 Summary The Cybersecurity and Infrastructure Security Agency (CISA) has consistently observed Chinese Ministry of State Security (MSS)-affiliated cyber threat actors using publicly available information sources and common, well-known tactics, techniques, and procedures (TTPs) to target U.S. Government agencies. CISA has observed these—and other threat actors with varying degrees of …

AA20-258A: Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity Read More »

Read More

AA20-245A: Technical Approaches to Uncovering and Remediating Malicious Activity

Original release date: September 1, 2020 Summary This joint advisory is the result of a collaborative research effort by the cybersecurity authorities of five nations: Australia,[1] Canada,[2] New Zealand,[3][4] the United Kingdom,[5] and the United States.[6] It highlights technical approaches to uncovering malicious activity and includes mitigation steps according to best practices. The purpose of …

AA20-245A: Technical Approaches to Uncovering and Remediating Malicious Activity Read More »

Read More

AA20-239A: FASTCash 2.0: North Korea's BeagleBoyz Robbing Banks

Original release date: August 26, 2020 Summary This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques. This joint advisory is the result of analytic efforts among the Cybersecurity and Infrastructure Security Agency (CISA), the Department of the Treasury (Treasury), …

AA20-239A: FASTCash 2.0: North Korea's BeagleBoyz Robbing Banks Read More »

Read More

AA20-227A: Phishing Emails Used to Deploy KONNI Malware

Original release date: August 14, 2020 Summary This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques. The Cybersecurity and Infrastructure Security Agency (CISA) has observed cyber actors using emails containing a Microsoft Word document with a malicious Visual Basic …

AA20-227A: Phishing Emails Used to Deploy KONNI Malware Read More »

Read More