Corvus June 2021 | Page 14

ransomware , SQL injection attacks , session hijacking and man-in-themiddle , phishing , denial of service ( DoS ), privileged escalations , brute force , unpatched vulnerable software attacks , credential reuse , remote code execution , etc . ( Mitchell , 2019 ).
Cybersecurity has evolved from defending a defined perimeter to defending boundless , infinite , highly mobile and dynamic workstations . With the adoption of remote work policies , defined work perimeters have significantly blurred , reducing visibility into cyber activities and driving an unprecedented expansion of cyber failure points . While the world battles the Covid-19 pandemic , cyber vulnerabilities escalated and resulted in the emergence of the “ fearware ” as people sought information ( Tett , 2020 and Swinhoe , 2020 ).
The convergence between organizational performance , employee safety & productivity , information / data security and business continuity emerged as millions of employees leveraged enterprise virtual private networks ( enterprise VPNs ) to transit from localized workspaces to scaled remote and digitalized workstations . Which has effectively altered the technology playbook of most organizations .
The activation of stay-at-home and social distancing protocols triggered the adoption of remote work arrangements as financially and technically prepared enterprises pushed to sustain business continuity and promote client / employee safety . There was widespread adoption of virtual collaboration and meeting platforms by business organizations to sustain communication , just as educational institutions evolved to the digitization of student and faculty engagements including the delivery of tuition through a suite of digital platforms . In addition , there was a significant rise in webinars and public and private stakeholder engagements through similar digital platforms . With the surge in the use of digital collaboration platforms , broadband data usage rose by over 47 % as large amounts of data were pushed into relatively unsecure digital territories , establishing large numbers of potential cyber failure points ( Ahmed ,
13 14 The Corvus