{"id":125,"date":"2020-06-25T12:44:14","date_gmt":"2020-06-25T12:44:14","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/?p=125"},"modified":"2020-06-26T12:47:07","modified_gmt":"2020-06-26T12:47:07","slug":"using-the-crisis-as-a-cybersecurity-opportunity","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blog\/using-the-crisis-as-a-cybersecurity-opportunity\/","title":{"rendered":"Using the crisis as a cybersecurity opportunity"},"content":{"rendered":"<p>With a minute\u2019s countdown to a crucial video conference, a remote worker will click on any link that gets them into a meeting on time. Yet that\u2019s the trojan horse criminals are using to breach defences during the coronavirus pandemic. People aren\u2019t the only ones being infected; devices are too, with. It\u2019s no wonder cybersecurity is now topping the business-risk agenda.<\/p>\n<p>\u201cThis new work-from-home experience makes everyone vulnerable, especially because,\u201d explains Chris Boyd, lead intelligence analyst at Malwarebytes. The rapid shift to a distributed workforce has been a golden opportunity for cybercriminals, even coining a new phrase \u2013 Zoom bombing \u2013 where video calls are hacked.<\/p>\n<p>In March alone, the UK\u2019s National Cyber Security Centre removed 2,000 online scams related to the pandemic, including 555 malware and 200 phishing sites. \u201cThis is why IT teams are rethinking the levels of oversight they have over network activity, especially as it now takes place across so many more disparate devices and locations,\u201d says Carl Leonard, a principal security analyst at Forcepoint.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With a minute\u2019s countdown to a crucial video conference, a remote worker will click on any link that gets them into a meeting on time. Yet that\u2019s the trojan horse criminals are using to breach defences during the coronavirus pandemic. People aren\u2019t the only ones being infected; devices are too, with. It\u2019s no wonder cybersecurity [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":146,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-125","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Using the crisis as a cybersecurity opportunity - Community<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blog\/using-the-crisis-as-a-cybersecurity-opportunity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Using the crisis as a cybersecurity opportunity - Community\" \/>\n<meta property=\"og:description\" content=\"With a minute\u2019s countdown to a crucial video conference, a remote worker will click on any link that gets them into a meeting on time. Yet that\u2019s the trojan horse criminals are using to breach defences during the coronavirus pandemic. People aren\u2019t the only ones being infected; devices are too, with. It\u2019s no wonder cybersecurity [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blog\/using-the-crisis-as-a-cybersecurity-opportunity\/\" \/>\n<meta property=\"og:site_name\" content=\"Community\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-25T12:44:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-26T12:47:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/06\/bandwidth-close-up-computer-connection-1148820.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"854\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/using-the-crisis-as-a-cybersecurity-opportunity\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/using-the-crisis-as-a-cybersecurity-opportunity\/\",\"name\":\"Using the crisis as a cybersecurity opportunity - Community\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/using-the-crisis-as-a-cybersecurity-opportunity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/using-the-crisis-as-a-cybersecurity-opportunity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/06\/bandwidth-close-up-computer-connection-1148820.jpg\",\"datePublished\":\"2020-06-25T12:44:14+00:00\",\"dateModified\":\"2020-06-26T12:47:07+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/using-the-crisis-as-a-cybersecurity-opportunity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blog\/using-the-crisis-as-a-cybersecurity-opportunity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/using-the-crisis-as-a-cybersecurity-opportunity\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/06\/bandwidth-close-up-computer-connection-1148820.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/06\/bandwidth-close-up-computer-connection-1148820.jpg\",\"width\":1280,\"height\":854},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/using-the-crisis-as-a-cybersecurity-opportunity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Using the crisis as a cybersecurity opportunity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/\",\"name\":\"Community\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Using the crisis as a cybersecurity opportunity - Community","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blog\/using-the-crisis-as-a-cybersecurity-opportunity\/","og_locale":"en_US","og_type":"article","og_title":"Using the crisis as a cybersecurity opportunity - Community","og_description":"With a minute\u2019s countdown to a crucial video conference, a remote worker will click on any link that gets them into a meeting on time. Yet that\u2019s the trojan horse criminals are using to breach defences during the coronavirus pandemic. People aren\u2019t the only ones being infected; devices are too, with. It\u2019s no wonder cybersecurity [&hellip;]","og_url":"https:\/\/www.tsfactory.com\/forums\/blog\/using-the-crisis-as-a-cybersecurity-opportunity\/","og_site_name":"Community","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2020-06-25T12:44:14+00:00","article_modified_time":"2020-06-26T12:47:07+00:00","og_image":[{"width":1280,"height":854,"url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/06\/bandwidth-close-up-computer-connection-1148820.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/using-the-crisis-as-a-cybersecurity-opportunity\/","url":"https:\/\/www.tsfactory.com\/forums\/blog\/using-the-crisis-as-a-cybersecurity-opportunity\/","name":"Using the crisis as a cybersecurity opportunity - Community","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/using-the-crisis-as-a-cybersecurity-opportunity\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/using-the-crisis-as-a-cybersecurity-opportunity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/06\/bandwidth-close-up-computer-connection-1148820.jpg","datePublished":"2020-06-25T12:44:14+00:00","dateModified":"2020-06-26T12:47:07+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/using-the-crisis-as-a-cybersecurity-opportunity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blog\/using-the-crisis-as-a-cybersecurity-opportunity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/using-the-crisis-as-a-cybersecurity-opportunity\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/06\/bandwidth-close-up-computer-connection-1148820.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/06\/bandwidth-close-up-computer-connection-1148820.jpg","width":1280,"height":854},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/using-the-crisis-as-a-cybersecurity-opportunity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/"},{"@type":"ListItem","position":2,"name":"Using the crisis as a cybersecurity opportunity"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/#website","url":"https:\/\/www.tsfactory.com\/forums\/","name":"Community","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/125","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/comments?post=125"}],"version-history":[{"count":1,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/125\/revisions"}],"predecessor-version":[{"id":176,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/125\/revisions\/176"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media\/146"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media?parent=125"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/categories?post=125"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/tags?post=125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}