Preparing for the Next Global Crisis - A Cyber Pandemic

People and organizations have suffered greatly from the coronavirus pandemic. Many critical lessons are being learned, but none more important that another devastating crisis could be brewing. A catastrophic cyber event has long been envisioned, and with today’s digitally connected world, a global cyber pandemic is now a reality.

Remote Work

Ensuring employees have secure access to corporate resources

Remote Productivity

Collaboration Tools

Replacing face-to-face activities with reliable virtual tools

Protect Yourself

Digital Transformation and Cloud

Accelerating the pace to trusted digitally connected services

Best Practices to Stay Safe in a Cyber Pandemic


As we‘ve learned, vaccination is far better than treatment. The same applies to your cyber security. Real time prevention places your organization in a better position to defend against the next cyber pandemic. 


Every part in the chain matters. Your new normal requires that you revisit and check the security level and relevance of your network’s infrastructures, processes, compliance of connected mobile, endpoint devices, and IoT.

The increased use of the cloud means an increased level of security, especially in technologies that secure workloads, containers, and serverless applications on multi- and hybrid-cloud environments.


Dramatic changes in your company’s infrastructure presents a unique opportunity to assess your security investments. Are you really getting what you need and are your point solution protecting the right things? Are there areas you’ve overlooked?

The highest level of visibility, reached through consolidation, will guarantee you the security effectiveness needed to prevent sophisticated cyber attack. Unified management and risk visibility fill out your security architecture. This can be achieved by reducing your point product solutions and vendors, and your overall costs.

Your New Cyber Security Normal

With a cyber pandemic, your cyber security demands that you understand the cyber risks with your changed computing environment. The matrix below provides a starting point as you re-assess your cyber security strategies.

Change Effect Risk Top Process & Technology
Working from home Personal mobile and computers provided access to corporate networks Data breach (e.g. key logger, screen logger on pc/mobile) 1. Implementation of endpoint security and hygiene with compliance check (latest patches, AV…)
2. User training awareness (e.g. phishing simulation)
3. Mobile threat defense on mobile
Rapid move to cloud » Speed of deployment on the expense of security Basic security controls can lead to data loss and manipulation 1. Invest in Cloud Security posture management
2. Deploy workload security for containers and serverless apps.
3. Real time prevention of threats with IaaS security
Critical infrastructure » Allowing critical infrastructure remote access Critical infrastructure breach 1. IoT security for IoT devices
2. bolster network security posture with red team …
3. OT security with Scada enforcement
Increased network capacity More throughput is needed to address data in motion Lack of service
Network is down
1. Invest in network security that scales according to needs
2. All protections must be enabled while keeping business continuity
3. Scalable secure remote access

Biological Pandemic vs. Cyber Pandemic:

Similarities and Parallelization, Lessons Learned

Share This Infographic:

Moving Beyond Coronavirus onto Safer Ground

We’ve all experienced that 2020 is like no other year in our recent history. It’s a crisis of such magnitude that has altered the way of life for societies around the world. It’s effects have been felt on our institutions and organizations.

We’ve also learned that the ability to be agile and act swiftly has been a necessity. The pandemic will pass over time, but it’s effects will be felt forever. As we move to safer ground, we’ll not take for granted our ability to stay connected and be protected. The “new normal” will require us to make changes and adapt to a new reality that could include a major cyber pandemic.

To know more what you can do for cyber security, contact your local Check Point Software representative. We’re ready to help with your move to safer ground.

Coronavirus Impact: Cyber Criminals Target Zoom Domains

During the past few weeks, we have witnessed a major increase in new domain registrations with names including “Zoom”, which has 20% of the video conferencing market. Since the beginning of 2020, more than 1700 new domains were registered and 25% of them were registered in the past week. Out of these registered domains, 4% have been found to contain suspicious characteristics.  Learn more about the cyber attacks
targeting users of Zoom video conferencing.

Protection from Hackers and Phishing Attempts

Since the Coronavirus outbreak began, a number of new websites have registered with domain names related to the virus. Here are our recommendations to stay protected:
  • Be cautious of special offers
  • Beware of lookalike domains
  • Ensure that you are visiting the authentic source

Coronavirus-themed Spam Spreads Dangerous Malware

Cyber-criminals are exploiting the public’s interest in this global epidemic, and its effects can be even worst with a cyber pandemic outbreak. Watch out for:

  • Malicious email attachments that appear official and relevant to your local situation

Coronavirus Impact: As Retailers Close their Doors, Hackers Open for Business

As the world takes action to contain coronavirus, hackers around the globe are taking advantage of the outbreak by accelerating activities to spread their own infections. It’s important to:
  • Remain cautious and alert
  • Report anything suspicious
This website uses cookies to ensure you get the best experience. Got it, Thanks! MORE INFO