IT Risk and Resilience - Cybersecurity Response to COVID-19

  title={IT Risk and Resilience - Cybersecurity Response to COVID-19},
  author={Timothy R. Weil and San Murugesan},
  journal={IT Prof.},
The rapid and worldwide spread of the coronavirus and its illness known as COVID-19 has made huge impact on almost everything has taken us all by surprise. We all are now experiencing a major unprecedented and unexpected global public health crisis. This pandemic has also triggered huge social upheavals, disrupted almost every industry, and impacted the life and work of everyone in almost every country. Businesses and educational institutions are closed, many employees are forced to work from… 

Figures and Tables from this paper

COVID-19 Age: Challenges in cybersecurity and possible solution domains
The significance of this paper is to highlight and review some types of cyberattacks associated with the COVID-19 presence, and recommend some guidelines and countermeasures for the micro-level of families, individuals and business enterprise to actively mitigate and control the consequences of such malicious attacks.
Cybercrime in the Context of COVID-19
  • Mohamed Chawki
  • Computer Science
    Lecture Notes in Networks and Systems
  • 2021
The main objective of this article is to address the cause of the online COVID-19 scams and analyze them accordingly, and to provide the contemporary techniques used by the scammers in harvesting information from the victims.
Health Care Cybersecurity Challenges and Solutions Under the Climate of COVID-19: Scoping Review
This scoping review identified the most impactful methods of cyberattacks that targeted the health sector during the COVID-19 pandemic, as well as the challenges in cybersecurity, solutions, and areas in need of improvement.
Challenges of Managing Information Security during the Pandemic
The COVID-19 pandemic of 2019 surprised information security practitioners in the organizations due to the change imposed on employees’ work routines and four challenges were found to be of concern: technical security, regulations and policies, employee awareness of security issues, and preparedness for the new work environment of teleworking.
Cybersecurity and remote working: Croatia’s (non-)response to increased cyber threats
It seems that many European countries have recognized cybersecurity as being crucial during the COVID-19 pandemic, while Croatia has stayed completely silent on the pandemic-related cybersecurity hazards; it has simply left companies to figure out their own ways of reacting to the increased cyber threats, without even warning individuals.
PANACEA resilient and secure toolkit for healthcare infrastructures
  • S. Sfakianakis, E. Spanakis, V. Sakkalis
  • Computer Science, Medicine
    2021 43rd Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC)
  • 2021
The PANACEA Solution Toolkit is a suite of complementary tools to provide Health Care Organizations (HCO) with assessment, guidance, technical and organizational “infrastructure” to address the cybersecurity challenges.
A Multivocal Literature Review on Growing Social Engineering Based Cyber-Attacks/Threats During the COVID-19 Pandemic: Challenges and Prospective Solutions
It is discovered that the major social engineering–based techniques used during the COVID-19 pandemic are phishing, scamming, spamming, smishing, and vishing, in combination with the most used socio-technical method: fake emails, websites, and mobile apps used as weapon platforms for conducting successful cyber-attacks.
The COVID‐19 scamdemic: A survey of phishing attacks and their countermeasures during COVID‐19
This survey paper reviews, summarises, compares and critically discusses 54 scientific studies and many reports by governmental bodies, security firms and the grey literature that investigated phishing attacks during COVID-19, or that proposed countermeasures against them.
Hybrid exercising for cyber-resilient healthcare and cross-sector crisis response operability
This paper presents the approach for the creation of a complex generic cyber range containing a variety of exercise polygons simulating and propagating vertical escalations related to the healthcare sector, its logistics, and supply chains within the context of COVID-19.
Cloud Computing and Covid-19
  • Raju Singh
  • Computer Science
    2021 3rd International Conference on Signal Processing and Communication (ICPSC)
  • 2021
The Cloud services are used to store, monitor, predict and analyze the huge set of patient’s data, which translates the tedious task of data processing into relatively easy one and helps mankind.


Cybersecurity framework
  • L. Johnson
  • Computer Science
    Security Controls Evaluation, Testing, and Assessment Handbook
  • 2020
CISA INSIGHTS: Risk Management for Novel Coronavirus (COVID-19)," CISA
    through-business-technology-lens COVID-19 and the New Leadership Agenda
      COVID-19 Through the Business Technology Lens
        Customer service continuity and lessons learned during the COVID-19 pandemic
          Five functions of the cybersecurity framework
          • NIST
          Sensing and shaping the postCOVID era,
          • FURTHER READINGS COVID-19: Your IEEE resources. [Online]. Available: COVID-19 Through the Business Technology Lens. [Online]. Available: COVID-19 and the New Leadership Agenda. [On
          • 2020