BOOK AN APPOINTMENT WITH AN IT SPECIALIST TODAY

[VIDEO] COVID-19 (Corona Virus): Business Continuity Plan Ready?

Coronavirus Spreading: Make Sure Your Business Continuity Plan Is Ready

The spread of COVID-19 (coronavirus) has taken root across the country. More and more locations are starting to report cases and this number continues to raise alarm bells throughout the medical profession, and unsurprisingly, across businesses everywhere.



Business Continuity During Crisis

In the video above, We shared with you the importance of making sure your business continuity strategies are in place and ready to go. Many of the largest global enterprises to local small businesses have begun to exercise and test business continuity strategies in the event that their offices and factories are shut down due to the spread of this virus – forcing staff members to work remotely to keep the business functioning.

Are you prepared in the event that your employees need to stay home due to quarantine or a similar occurrence? If not, we urge you to reach out to us to talk about setting up:

  1. Remote access solutions that let your team work from home with access to data, applications, and systems.
  2. Communication solutions that enable anytime, anywhere communication via the internet from any device or location.
  3. Cybersecurity solutions for office and home computers that keep you safe against cybercriminals leveraging this major headline as a mechanism of social engineering.
  4. Emergency procedures that outline how to recover equipment, emergency contact information for employees, and more.
  5. Virtual private network (VPN) technology to ensure your employees are using a secure, encrypted connection at home to access corporate information.

Systems MUST be in place for employees working from home as they’re using their own computers to access corporate resources. It’s up to you to make sure those computers are clean from viruses or other security issues.

Our team is more than familiar with creating proven contingency plans for situations like this. You don’t have to handle this difficult situation alone. We can help you get prepared and make sure your employees are accessing corporate information in a safe and secure manner.

Reach out to us right away over the phone, by email or by visiting our website.

COVID-19 Business Continuity

More Like This

AA20-227A: Phishing Emails Used to Deploy KONNI Malware

Original release date: August 14, 2020 Summary This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques. The Cybersecurity and Infrastructure Security Agency (CISA) has observed cyber actors using emails containing a Microsoft Word document with a malicious Visual Basic …

AA20-227A: Phishing Emails Used to Deploy KONNI Malware Read More »

Read More

AA20-225A: Malicious Cyber Actor Spoofing COVID-19 Loan Relief Webpage via Phishing Emails

Original release date: August 12, 2020 Summary The Cybersecurity and Infrastructure Security Agency (CISA) is currently tracking an unknown malicious cyber actor who is spoofing the Small Business Administration (SBA) COVID-19 loan relief webpage via phishing emails. These emails include a malicious link to the spoofed SBA website that the cyber actor is using for …

AA20-225A: Malicious Cyber Actor Spoofing COVID-19 Loan Relief Webpage via Phishing Emails Read More »

Read More

AA20-209A: Potential Legacy Risk from Malware Targeting QNAP NAS Devices

Original release date: July 27, 2020 Summary This is a joint alert from the United States Cybersecurity and Infrastructure Security Agency (CISA) and the United Kingdom’s National Cyber Security Centre (NCSC). CISA and NCSC are investigating a strain of malware known as QSnatch, which attackers used in late 2019 to target Network Attached Storage (NAS) …

AA20-209A: Potential Legacy Risk from Malware Targeting QNAP NAS Devices Read More »

Read More

AA20-206A: Threat Actor Exploitation of F5 BIG-IP CVE-2020-5902

Original release date: July 24, 2020 Summary The Cybersecurity and Infrastructure Security Agency (CISA) is issuing this alert in response to recently disclosed exploits that target F5 BIG-IP devices that are vulnerable to CVE-2020-5902. F5 Networks, Inc. (F5) released a patch for CVE-2020-5902 on June 30, 2020.[1] Unpatched F5 BIG-IP devices are an attractive target …

AA20-206A: Threat Actor Exploitation of F5 BIG-IP CVE-2020-5902 Read More »

Read More

AA20-205A: NSA and CISA Recommend Immediate Actions to Reduce Exposure Across Operational Technologies and Control Systems

Original release date: July 23, 2020 Summary Note: This Activity Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise and ATT&CK for Industrial Control Systems frameworks for all referenced threat actor techniques and mitigations. Over recent months, cyber actors have demonstrated their continued willingness to conduct malicious cyber activity …

AA20-205A: NSA and CISA Recommend Immediate Actions to Reduce Exposure Across Operational Technologies and Control Systems Read More »

Read More

AA20-198A: Malicious Cyber Actor Use of Network Tunneling and Spoofing to Obfuscate Geolocation

Original release date: July 16, 2020 Summary This Activity Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) and Pre-ATT&CK frameworks. See the MITRE ATT&CK for Enterprise and Pre-ATT&CK frameworks for referenced threat actor techniques. Attributing malicious cyber activity that uses network tunneling and spoofing techniques to a specific threat actor is difficult. …

AA20-198A: Malicious Cyber Actor Use of Network Tunneling and Spoofing to Obfuscate Geolocation Read More »

Read More