The Post-COVID-19 Era Brings a New Age of Cybersecurity Concern
The pandemic has forced employees to work remotely, resulted in school closures impacting almost 70% of the world's student population, and given rise to a number of new online scams. These drastic, rapid changes highlight the need for better organizational and individual cybersecurity practices.
July 02, 2020 at 11:00 AM
8 minute read
As COVID-19 continues to alter the way we live our lives, organizations and individuals must protect their sensitive data in order to protect themselves. While some changes are likely to be temporary, others are will have long-lasting effects. The pandemic has forced employees to work remotely, resulted in school closures impacting almost 70% of the world's student population, and given rise to a number of new online scams. These drastic, rapid changes highlight the need for better organizational and individual cybersecurity practices.
As we move toward even greater reliance on computer networks, we must also consider how to do so safely and how to provide virtual security while protecting digital privacy rights. The unexpected transition to a mass work-from-home setting has introduced new and vulnerable points on which attackers will focus. Employers have been forced to rely upon communication technologies that have not been as secure as was hoped or expected. At the same time, there has been a rise in malicious social cyber activity such as online scams and phishing emails. To minimize vulnerabilities and any accompanying liability, organizations and individuals should reconsider their privacy and security practices and policies.
While security measures require investment up-front, the average cost of a data breach in the United States was $8.19 million in 2019. Moreover, in addition to the expenses to respond to and recover from data breaches, there is a trend towards individual recovery from lawsuits. To avoid potential operational risks and legal liabilities, employers and other organizations should take precautionary steps in a number of areas now.
Remote Work Concerns
Organizations that have transitioned all or part of their workforce to remote work must consider how they will achieve reasonable security. For many organizations, this means expanded use of virtual private networks (VPNs), multifactor authentication (MFA) rather than single-factor authentication, antivirus software, and firewalls. In addition to such tools, organizations must also consider other security controls, such as policies and training. As COVID-19 pushes more employees to work remotely, these policies and trainings should reflect this new reality—from considering the physical security and privacy of home offices to the use of third-party protection devices. Organizations, large and small, must consider their capabilities and what they can ask of their employees.
No single tool or policy is likely to be sufficient for all settings, nor is perfect security a practical goal. Organizations should instead adopt a defense-in-depth strategy. By implementing diverse, independent security controls, organizations can mitigate against the threat of a cyber attack. Any strategy will require an understanding of the particular conditions under which employees are working. Remote work arrangements should utilize technical controls to adequately encrypt and secure data, prevent both malicious attacks and unintentional mistakes, and recognize the need to implement both physical and technical security controls.
In establishing better cybersecurity practices, organizations should review the type of data they store, transmit, or otherwise possess themselves or with their third-party partners. Organizations that deal with sensitive data—which should be broadly understood as the sum of the data controlled—should utilize stronger security measures. Moreover, organizations should minimize the data they collect and store in order to become less attractive as a target of attack.
Cloud Computing
The COVID-19 pandemic has also driven further reliance on cloud computing, the practice of using a network of remote servers to store, manage, and process data. Cloud computing can provide significant benefits to organizations though reduced IT costs and increased ease of collaboration on remote work. As offices have shut down or scattered to homes, the value of cloud computing has become even more pronounced.
Cloud computing, however, comes with its own risks concerning the confidentiality, integrity, and availability of data. Organizations, especially those in heavily regulated industries or jurisdictions, that use cloud computing services must be cognizant of the security practices of their service providers. Newer laws and regulations have begun to hold organizations in a broader array of business sectors responsible for the security practices of their business associates. As a result, an organization can be held liable if their cloud service provider is not exercising reasonable security.
Moreover, in addition to employee and customer data, organizations may have sensitive intellectual property that they must keep confidential. Making data available in the cloud, however, creates additional exposure for the data. This exposure is further amplified if the data must also be available to a team, as each set of employee credentials (username and password) provides an additional avenue for a data hack or leak in the cloud. As a result, organizations that use multifactor authentication are better able to secure the confidentiality of their data.
Protecting the confidentiality of data is not the only concern companies should have, they must also ensure that the data is accessible and reliable. For organizations that store data online, the ability to access that data may become compromised. If a cloud network goes down, a company's access to its data may be lost across all employees unless local backups are maintained. Organizations must also determine their needs and preferences for access to a data set by multiple employees at the same time. Thus, choices must be individualized for the organization—while some organizations will prefer greater access, others must take steps to make modifications to maximize data security.
Online Fraud and Cyber Extortion
Malicious actors have also responded to the COVID-19 pandemic. From ransomware attacks targeting health care systems to an increase in phishing campaigns, there has been a rise in cyber threats during the pandemic. While some threats are perpetrated by criminal organizations, others are conducted or sponsored by foreign countries. No matter its source, organizations and individuals can—and should—take measures to protect themselves against fraudulent conduct. While antivirus software and other technical measures help to reduce successful attacks, individual users must also exercise basic caution and wisdom when opening links and attachments or providing information online or by email, phone or even regular mail.
Cyber threats arising during the pandemic have taken advantage of uncertainty, inaction and confusion. Phishing scams, for example, are capitalizing on the increase in email traffic, the use of personal devices to perform organizational work, and the reduced availability of live interaction. COVID-19 also complicates the work of cybersecurity professionals and teams. While some work can be done remotely, other activities are most effectively done in person or when hard-wired. Importantly, the increase in vulnerable points, whether from home internet connections, the use of personal devices, or poorly configured home office spaces, adds additional difficulty to a field already suffering from a critical shortage of trained individuals.
Legal Trends and Developments
The COVID-19 pandemic has highlighted the need for increased legislative attention, funding, and action to improve the nation's cybersecurity infrastructure and practices. Some changes have already been proposed, but others are more likely to build upon trends developing before the pandemic began. In addition to developing state and international law on the subject, a bill was introduced in the U.S. Senate on May 14 that would require organizations to implement reasonable privacy and security practices. The bill would also allow for a private right of action by individuals for recovery of up to $5,000, attorney fees and litigation costs. The provision of such incentives to litigate individual rights is likely to cause an increase in the number of data breach lawsuits.
As a result, organizations should create or update enterprise risk policies and plans, with an updated understanding of cyber threats. Creating an effective risk enterprise management plan is an involved process and should contemplate the unique situation that the organization is in and where it wants to go. Moreover, a risk enterprise management plan should account for the new threat landscape that COVID-19 has produced and for the various requirements of jurisdictions in which the organization may operate. Many jurisdictions have created broadly applicable laws with varying and sometimes contradictory requirements. Consulting with legal experts will help an organization understand risks and reduce liabilities before they come to fruition.
In considering how to operate as a result of the pandemic, organizations must account for cybersecurity. Failure to do so not only risks disruption to an organization's activities but also threatens significant costs, regulatory action and potential liability in litigation. In sum, the COVID-19 pandemic will likely accelerate the growth in cybersecurity issues generally, and organizational readiness and response capabilities have become crucial as a result.
J. Alexander Hershey is a member of Clark Hill and its Litigation practice group focusing on unfair competition, trade regulation, and intellectual property protection, including with respect to technical and cybersecurity practices. Contact him at [email protected].
Sebastian M. Fischer was recently an associate in the firm's litigation practice group when he contributed to this article. He now holds an Internship position the U.S. Cybersecurity and Infrastructure Security Agency, although the views expressed herein are not specifically a reflection of the views of the United States government and/or CISA. Contact him at [email protected].
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllPa. Federal District Courts Reach Full Complement Following Latest Confirmation
The Defense Bar Is Feeling the Strain: Busy Med Mal Trial Schedules Might Be Phila.'s 'New Normal'
7 minute readFederal Judge Allows Elderly Woman's Consumer Protection Suit to Proceed Against Citizens Bank
5 minute readJudge Leaves Statute of Limitations Question in Injury Crash Suit for a Jury
4 minute readLaw Firms Mentioned
Trending Stories
- 1Big Law Firms Sheppard Mullin, Morgan Lewis and Baker Botts Add Partners in Houston
- 2Lack of Jurisdiction Dooms Child Sex Abuse Claim Against Archdiocese of Philadelphia, says NJ Supreme Court
- 3DC Lawsuits Seek to Prevent Mass Firings and Public Naming of FBI Agents
- 4Growth of California Firms Exceeded Expectations, Survey of Managing Partners Says
- 5Blank Rome Adds Life Sciences Trio From Reed Smith
Who Got The Work
J. Brugh Lower of Gibbons has entered an appearance for industrial equipment supplier Devco Corporation in a pending trademark infringement lawsuit. The suit, accusing the defendant of selling knock-off Graco products, was filed Dec. 18 in New Jersey District Court by Rivkin Radler on behalf of Graco Inc. and Graco Minnesota. The case, assigned to U.S. District Judge Zahid N. Quraishi, is 3:24-cv-11294, Graco Inc. et al v. Devco Corporation.
Who Got The Work
Rebecca Maller-Stein and Kent A. Yalowitz of Arnold & Porter Kaye Scholer have entered their appearances for Hanaco Venture Capital and its executives, Lior Prosor and David Frankel, in a pending securities lawsuit. The action, filed on Dec. 24 in New York Southern District Court by Zell, Aron & Co. on behalf of Goldeneye Advisors, accuses the defendants of negligently and fraudulently managing the plaintiff's $1 million investment. The case, assigned to U.S. District Judge Vernon S. Broderick, is 1:24-cv-09918, Goldeneye Advisors, LLC v. Hanaco Venture Capital, Ltd. et al.
Who Got The Work
Attorneys from A&O Shearman has stepped in as defense counsel for Toronto-Dominion Bank and other defendants in a pending securities class action. The suit, filed Dec. 11 in New York Southern District Court by Bleichmar Fonti & Auld, accuses the defendants of concealing the bank's 'pervasive' deficiencies in regards to its compliance with the Bank Secrecy Act and the quality of its anti-money laundering controls. The case, assigned to U.S. District Judge Arun Subramanian, is 1:24-cv-09445, Gonzalez v. The Toronto-Dominion Bank et al.
Who Got The Work
Crown Castle International, a Pennsylvania company providing shared communications infrastructure, has turned to Luke D. Wolf of Gordon Rees Scully Mansukhani to fend off a pending breach-of-contract lawsuit. The court action, filed Nov. 25 in Michigan Eastern District Court by Hooper Hathaway PC on behalf of The Town Residences LLC, accuses Crown Castle of failing to transfer approximately $30,000 in utility payments from T-Mobile in breach of a roof-top lease and assignment agreement. The case, assigned to U.S. District Judge Susan K. Declercq, is 2:24-cv-13131, The Town Residences LLC v. T-Mobile US, Inc. et al.
Who Got The Work
Wilfred P. Coronato and Daniel M. Schwartz of McCarter & English have stepped in as defense counsel to Electrolux Home Products Inc. in a pending product liability lawsuit. The court action, filed Nov. 26 in New York Eastern District Court by Poulos Lopiccolo PC and Nagel Rice LLP on behalf of David Stern, alleges that the defendant's refrigerators’ drawers and shelving repeatedly break and fall apart within months after purchase. The case, assigned to U.S. District Judge Joan M. Azrack, is 2:24-cv-08204, Stern v. Electrolux Home Products, Inc.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250