Corvus June 2021 | Page 17

Curry , S . ( 2020 ). Four Major Cybersecurity Risks of Working from Home ( WFH ). Entrepreneur . Retrieved from https :// www . entrepreneur . com / article / 348346 on July 15 , 2020
Davis , N . & Pipikaite , A . ( 2020 ). What the Covid-19 pandemic teaches us about cybersecurity – and how to prepare for inevitable global cyber-attack . World Economic Forum . Retrieved from https :// www . weforum . org / agenda / 2020 / 06 / covid-19-pandemic-teachesus-about-cybersecurity-cyberattack-cyberpandemic-risk-virus / on July 24 , 2020
Desai , D . ( 2020 ). 30,000 % increase in Covid-19 Themed Attacks . ZSCALER . Retrieved from https :// www . zscaler . com / blogs / research / 30000- percent-increase-covid-19-themed-attacks on July 24 , 2020
Fernandes , N . ( 2020 ). Economic Effects of Coronavirus Outbreak ( COVID-19 ) on the World Economy . SSRN . Retrieved from http :// dx . doi . org / 10.2139 / ssrn . 3557504 on July 21 , 2020
Fruhlinger , J . ( 2020 ). What is Smishing ? How Phishing via text message works . CSO , Retrieved from https :// www . csoonline . com / article / 3538831 / what-is-smishing-how-phishing-via-textmessage-works . html on July 19 , 2020
Fruhlinger , J . ( 2020 ). Vishing Explained . How Voice Phishing attack victims . CSO . Retrieved from https :// www . csoonline . com / article / 3543771 / vishing-explained-how-voice-phishing-attacksscam-victims . html on July 19 , 2020
Fruhlinger , J . ( 2020 ). What is Pretexting ? Definition , Examples and Prevention . CSO . Retrieved from https :// www . csoonline . com / article / 3546299 / what-is-pretexting-definitionexamples-and-prevention . html on July 19 , 2020 .
Hospelhorn , S . ( 2020 ). The Future of Cybersecurity Budgeting . VARONIS . Retrieved from https :// www . varonis . com / blog / cybersecurity-budget / on July 21 , 2020
Kaiser , A . & Ramaswami , S . S . ( 2020 ). Navigating Cybersecurity during a Pandemic : Latest Malware and Threat Actors . Retrieved from https :// umbrella . cisco . com / blog / navigatingcybersecurity-during-a-pandemic-latestmalware-and-threat-actors on July 13 , 2020
Mitchell , J . ( 2019 ). Domains of Cybersecurity : A brief Overview . Hacking into Cybersecurity . Retrieved from https :// linuxacademy . com / blog / security / domains-of-cybersecurity-a-briefoverview-hacking-into-cybersecurity / on July 20 , 2020
Mutune , G . ( 2020 ). Work from Home ( WFH ) Cyber Risks . Retrieved from https :// cyberexperts . com / work-from-home-cyber-risks % EF % BB % BF / on July 15 , 2020
Nimmo , B . ( 2020 ). Business Continuity in a Covid-19 World . KMPG . Retrieved from https :// home . kpmg / xx / en / home / insights / 2020 / 03 / business-continuity-in-a-covid-19-world . html on July 19 , 2020
Roy , D . ( 2020 ). Video Conferencing App Zoom Tops Downloads Chart in April . Entrepreneur , India . Retrieved from https :// www . entrepreneur . com / article / 350431 on July 23 , 2020
Sobers , B . ( 2020 ). 110 Must Know Cybersecurity Statistics for 2020 . VARONIS . Retrieved from https :// www . varonis . com / blog / cybersecuritystatistics / on July 23 , 2020
Staff , D . ( 2020 ). Cybersecurity Budgets : Will they survive Covid-19 ? Retrieved from https :// insights . dice . com / 2020 / 06 / 22 / cybersecurity-budgets-willthey-survive-covid-19 / on July 19 , 2020
Swinhoe , D . ( 2020 ). 8 Way attackers are Exploiting the Covid-19 Crisis . Retrieved from https :// www . csoonline . com / article / 3532825 / 6- ways-attackers-are-exploiting-the-covid-19- crisis . html on July 21 , 2020
Woollacott , E . ( 2020 ). Cybersecurity and Covid-19 : The first 100 days . Forbes . Retrieved from https :// www . forbes . com / sites / emmawoollacott / 2020 / 05 / 05 / exclusive- cybersecurity-and-covid-19the-first-100- days /# 2ccc12d639d5 on July 21 , 2020
Wong , C . ( 2019 ). Three Cybersecurity trends that might surprise you . Retrieved from https :// blog . allstream . com / 3-cybersecurity-trends-thatmight-surprise-you / on July 13 , 2020
Webography
https :// www . forcepoint . com / cyber-edu / cybersecurity . Accessed on July 14 , 2020
https :// www . techfunnel . com / informationtechnology / 11-best-virtual-meeting-platformsfor-business /. Accessed on July 15 , 2020
https :// www . cisco . com / c / en / us / products / security / what-is-cybersecurity . html . Accessed on July 15 , 2020
https :// www . kaspersky . com / resource-center / definitions / what-is-cyber-security . Accessed on July 13 , 2020
https :// www . worldbank . org / en / news / feature / 2020 / 06 / 08 / the-global-economicoutlook-during-the-covid-19-pandemic-achanged-world , Accessed on July 19 , 2020
https :// nairametrics . com / 2020 / 05 / 17 / frompandemic-to-poverty-nigerias-future-withcovid-19 /. Accessed on July 19 , 2020
https :// www . bdc . ca / en / articles-tools / businessstrategy-planning / manage-business / pages / business-continuity-8-steps-building-plan . aspx . Accessed on July 20 , 2020
https :// www . certsign . ro / en / fearwarecyberattacks-in-the-context-of-covid-19-whatare-they-and-how-do-we-avoid-them . Accessed on July 21 , 2020