Ask the Expert : Ilia Kolochenko, CEO, ImmuniWeb

How are cybercriminals exploiting people working from home?

It is a convoluted mix of infrastructural unreadiness and overly susceptible human physiology during the spiraling crisis. Some cybercriminals mostly exploit uncertainty and aptly forge emails or SMSs from state authorities, imposing or demanding certain actions such as sharing confidential data or clicking on a malicious link to infect victims with malware. Others, merely exploit overall lack of security hardening of home, or home-placed computers, and deploy various well-known attacks, ranging from large-scale spear-phishing campaigns to sophisticated BEC targeting C-level executives. Sadly, all these vectors are highly efficient, while breach investigation is hindered by suddenly disorganized IT and security teams trying to adapt themselves to the new reality.

Will video conferencing calls make individuals more vulnerable?

Conference calls do not create additional cybersecurity risk per se, however, expand a wide spectrum of the existing attack scenarios, for example, by sending fake Zoom or WebEx invites.

Will we see new types of phishing and attacks?

From a technical standpoint, there are no substantially new phishing techniques imputable to Covid-19, but merely new vectors such as new reasons to lure victims into clicking on a malicious link for example.

Should the cybersecurity of workers be their own responsibility, or that of their employers?

In light of the spiraling panic, partial shortage of food and medication in some European and US cities, it would be somewhat unreasonable to shift this burden to already overburdened and stressed employees.

What will be the effect on cyber insurance from the current climate?

For the moment, it is virtually impossible to give a long-term forecast, though it would be reasonable to expect a spike in demand for insurance, and a subsequent price increase. Insurance companies will also likely gradually scrutinize incoming claims for coverage, imposing higher standards of requisite cybersecurity. Otherwise, careless or simply unprepared home-based workers will empty their pockets within a few weeks.

What are the best “quick cybersecurity wins” for home workers to implement?

Remaining vigilant is probably the best action the would-be victims can undertake. Corporations should rapidly develop and promulgate a clear, coherent and efficient cybersecurity communication strategy, reminding teams about basic precautions and security policies, including how to report an incident or suspicious activity.

What are the cybersecurity practical tips for anyone working from home?

Double-check authenticity of any incoming messages, emails or phone calls. In case of any doubt, report to your internal security team or police. Be particularly prudent when someone is trying to extract any data from you in emergency, pretending there is no time to convincingly explain the context.

How can businesses improve cybersecurity measures organisation-wide?

Consistent, threat-aware and risk-based cybersecurity policy shall be relentlessly promulgated to employees in an easily-consumable and friendly manner.

How might the current climate affect businesses long term?

Rather than it being a unique opportunity for businesses to tighten up their defences for the long term, it is a challenge that may kill weak and unprepared companies.

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Image provided by Veeam

AI and Ransomware: Cutting Through the Hype

Rick Vanover, Vice President Product Strategy, Veeam discusses how It might be the great paradox: Artificial Intelligence (AI)….
Copyright: Security Buyer

AmiViz Partners with Titania

AmiViz announced a strategic distribution agreement with Titania. This collaboration underscores a shared commitment to enhancing…
Oil and Gas

Navigating Africa’s Oil & Gas Industry

A comprehensive analysis of security strategies in Africa’s oil and gas industry, covering physical, cyber, and remote surveillance measures.
blackhat

Black Hat Europe Starts Soon

Black Hat Europe starts Monday and now is the perfect time to start planning your experience. With a full lineup of Keynotes…

VIVOTEK’s All-in-One Software Boosts Operational Efficiency for Enterprises

As demand for high-efficiency security systems rises among large enterprises, the global leading…
Assa Abloy website

WTC Amsterdam enhances security and efficiency with digital access solution

The World Trade Center (WTC) Amsterdam, home to over 300 companies, has upgraded its building security with a streamlined, digital access solution from ASSA ABLOY.
John Maddison website

Fortinet launches Lacework FortiCNAPP to enhance cloud-native security

In an advancement in cybersecurity, Fortinet has announced Lacework FortiCNAPP, providing organisations with visibility and security.
GITEX Global 2024 website

GITEX GLOBAL 2024: AI revolution drives strategic tech innovation

GITEX GLOBAL 2024 concluded on Friday, showcasing artificial intelligence (AI) as a transformative force driving business and economic growth
Security Mircon website

Edge Storage Powers Cloud Security

Micron Technology, alongside International Security Buyer, conducted a survey of installers, integrators, distributors, and security managers
Scroll to Top