top of page
ICIT Research

The COVID-19 Checklist: Detailed Steps to Better Protect Your Organization

Updated: Feb 12, 2023

ICIT Solution Insights offers use case based education on technology products and how they address problems facing our nation’s critical infrastructure sectors. These reports help our community navigate the crowded vendor ecosystem with trusted knowledge from ICIT.

Just because we are in the midst of a global pandemic does not mean we get a reprieve from cyber threats. Reports of COVID-19 related incidents show that many adversaries appear emboldened by the ongoing chaos and aim to compromise sensitive networks and systems while the workforce is adapting to the turmoil. For instance, a malicious coronavirus tracker was found to be spreading malware, the FBI has reported phishing campaigns with COVID-19 themed lures, and the Department of Health and Human Services (HHS) experienced DDoS attempts from multiple sources. Regardless of how long this current pandemic lasts, the age of mass teleworking is here. Adversaries are aware of the challenges that telework has introduced into the security landscape and they are leveraging the dynamics of the ongoing crisis to exploit corporate systems that may not have been adequately secured or prepared for the telework migration. This report provides detailed nontechnical and technical steps that can improve the security posture of any organization. Triage and Update Existing Security Policies and Procedures

  1. Reduce the Risk of Insider Threats

  2. Secure Wi-Fi Connections

  3. Establish Clear and Consistent Communication

  4. Restrict Transmission of Organization Data

  5. Update Security Policies

  6. Provide Telework Support

  7. Educate on the Risk of Phishing Scams

  8. Secure Physical Workspaces Plan for the Future

Plan for the Future

  1. Implement and Require a Virtual Private Network (VPN)

  2. Protect Endpoints

  3. Secure Applications

  4. Consider Virtualization

  5. Enforce Multifactor Authentication

  6. Encrypt Sensitive Data While in Storage, Processing, and Transit

  7. Monitor User Behavior

Additionally, the report recommends applicable products from MicroFocus Government Solutions that can be leveraged to secure your business.

Download the Full Report


ICIT would like to thank the following experts for their contributions:

  1. Parham Eftekhari - Executive Director, ICIT

  2. Kevin Hansen - Chief Technologist, Micro Focus Government Solutions

  3. Drew Spaniel - Lead Researcher, ICIT

  4. David Wray - Chief Technology Officer, Micro Focus Government Solutions


bottom of page