{"id":3518,"date":"2020-06-02T11:02:00","date_gmt":"2020-06-02T15:02:00","guid":{"rendered":"http:\/\/gsablogs.gsa.gov\/technology\/?p=3518"},"modified":"2024-01-11T18:16:43","modified_gmt":"2024-01-11T23:16:43","slug":"cybersecurity-best-practices-during-the-covid-19-pandemic","status":"publish","type":"post","link":"https:\/\/gsablogs.gsa.gov\/technology\/2020\/06\/02\/cybersecurity-best-practices-during-the-covid-19-pandemic\/","title":{"rendered":"Cybersecurity Best Practices During the COVID-19 Pandemic"},"content":{"rendered":"\n<p>The unprecedented and extraordinary efforts by businesses and Federal agencies to keep employees and customers safe during the COVID-19 pandemic have also inadvertently opened the door to cyberattacks.<\/p>\n\n\n\n<p>Large-scale transitions to work-from-home technologies, heightened activity on many public-facing networks, and greater use of online services have presented new openings for cyber attackers to exploit. As people around the world shelter in place, they turn to online platforms to chat with friends, shop, work, and go to school. That transition to virtual life puts a large strain on cybersecurity controls.<\/p>\n\n\n\n<p>Federal agencies face new daily challenges in assuring the security of networks. In the midst of the current global pandemic that imperative is even greater \u2014 they must protect their institutions while ensuring that daily tasks go on uninterrupted. The <a href=\"https:\/\/www.whitehouse.gov\/wp-content\/uploads\/2020\/03\/M-20-19.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Office of Management and Budget (OMB) recommends<\/a> that agencies \u201cmake risk-based decisions as appropriate to meet mission needs\u201d during the COVID-19 pandemic.<\/p>\n\n\n\n<p>It is important now for agency leaders to focus on supporting technologies and capabilities that are absolutely essential to their organizations\u2019 operations. Priority actions \u2014 and relevant technologies \u2014 may include testing already existing security plans, continuously monitoring security systems, and maintaining access security. GSA\u2019s <a rel=\"noreferrer noopener\" href=\"https:\/\/www.gsa.gov\/technology\/technology-products-services\/it-security\/highly-adaptive-cybersecurity-services-hacs\" target=\"_blank\">Highly Adaptive Cybersecurity Services (HACS)<\/a> Special Item Number (SIN) provides Federal agencies with rapid access to cybersecurity vendors who can assist with the following priority actions and more.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Best practices<\/h2>\n\n\n\n<p><strong>Testing<\/strong> and having <a href=\"https:\/\/gsablogs.gsa.gov\/technology\/2020\/03\/10\/incident-response-protecting-your-agency-before-and-after-a-cyber-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">incident response<\/a> plans in place are helpful for any agency. If an agency has plans such as incident response, disaster recovery, or continuity, it is important to test those plans and assess any risks as soon as possible. GSA\u2019s HACS SIN provides rapid access to vendors evaluated for incident response services.<\/p>\n\n\n\n<p>Chief Information Security Officers (CISOs) should continue to <strong>monitor their systems<\/strong> closely in order to identify cybersecurity events and incidents as soon as they may appear. Focus areas include monitoring networks for new strains of malware, monitoring collaboration tools such as Google Drive or Dropbox, and monitoring personnel activity. CISOs can also monitor their systems by using Intrusion Detection Systems or their preferred live network monitoring software. The HACS SIN is an efficient way to access these capabilities.<\/p>\n\n\n\n<p><strong>Access management in a remote work environment<\/strong> is another essential focus area during the COVID-19 pandemic. Though cybersecurity is essential, so is the physical safety of the American people. Agencies are encouraging teleworking whenever possible to adhere to the Government\u2019s social distancing guidelines, and cybersecurity experts are needed to help make telework safe and secure for employees.<\/p>\n\n\n\n<p>With many \u2014 if not all \u2014 of an agency\u2019s employees working from home, click-through rates for phishing emails may increase when employees no longer work closely enough with coworkers to ask them in person about suspicious activity. Remote work can also require agencies to enable offsite access to critical and\/or confidential information, which can increase the risk of a cyber attack. Employees can mitigate this risk by adhering to their agency\u2019s access control policy and utilizing secure connections (such as Two-Factor Authentication (2FA) and\/or VPN) when accessing Government networks containing sensitive information.<\/p>\n\n\n\n<p>The COVID-19 pandemic is first and foremost a human challenge, with heads of agencies and employees all juggling professional duties with personal and family responsibilities. The risk of cyberattacks will be elevated, but by focusing now on cyber activities \u2014 testing response plans, monitoring security systems, and maintaining personnel security \u2014 agencies can successfully maintain their security.<\/p>\n\n\n\n<p>GSA is here to help connect Federal agencies with vendors that provide necessary cybersecurity services during this time through the HACS SIN solution. For more information, visit the <a rel=\"noreferrer noopener\" href=\"https:\/\/www.gsa.gov\/technology\/technology-products-services\/it-security\/highly-adaptive-cybersecurity-services-hacs\" target=\"_blank\">HACS Homepage<\/a>. To learn more about the additional services the HACS SIN provides, watch our <a rel=\"noreferrer noopener\" href=\"https:\/\/www.youtube.com\/watch?v=n2YlNXGZdxA\" target=\"_blank\">HACS Overview Video<\/a>.<\/p>\n\n\n\n<p>Please follow us on Twitter <a href=\"https:\/\/twitter.com\/GSA_ITC\" target=\"_blank\" rel=\"noreferrer noopener\">@GSA_ITC<\/a> and <a href=\"https:\/\/www.linkedin.com\/showcase\/office-of-information-technology-category-itc-\" target=\"_blank\" rel=\"noreferrer noopener\">LinkedIn<\/a> to join our ongoing conversations about government IT.<\/p>\n\n\n\n<p>To get updates for this blog, please sign up on the right-hand side of the page where it says <a href=\"https:\/\/www.gsa.gov\/technology\/technology-programs\" target=\"_blank\" rel=\"noreferrer noopener\">Sign up for Blog Updates<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The unprecedented and extraordinary efforts by businesses and Federal agencies to keep employees and customers safe during the COVID-19 pandemic have also inadvertently opened the door to cyberattacks. Large-scale transitions to work-from-home technologies, heightened activity on many public-facing networks, and greater use of online services have presented new openings for cyber attackers to exploit. As &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/gsablogs.gsa.gov\/technology\/2020\/06\/02\/cybersecurity-best-practices-during-the-covid-19-pandemic\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Cybersecurity Best Practices During the COVID-19 Pandemic&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1138,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[19152],"tags":[19212,135,19172],"class_list":["post-3518","post","type-post","status-publish","format-standard","hentry","category-it-security","tag-covid-19","tag-cybersecurity","tag-hacs"],"_links":{"self":[{"href":"https:\/\/gsablogs.gsa.gov\/technology\/wp-json\/wp\/v2\/posts\/3518","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gsablogs.gsa.gov\/technology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gsablogs.gsa.gov\/technology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gsablogs.gsa.gov\/technology\/wp-json\/wp\/v2\/users\/1138"}],"replies":[{"embeddable":true,"href":"https:\/\/gsablogs.gsa.gov\/technology\/wp-json\/wp\/v2\/comments?post=3518"}],"version-history":[{"count":5,"href":"https:\/\/gsablogs.gsa.gov\/technology\/wp-json\/wp\/v2\/posts\/3518\/revisions"}],"predecessor-version":[{"id":3523,"href":"https:\/\/gsablogs.gsa.gov\/technology\/wp-json\/wp\/v2\/posts\/3518\/revisions\/3523"}],"wp:attachment":[{"href":"https:\/\/gsablogs.gsa.gov\/technology\/wp-json\/wp\/v2\/media?parent=3518"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gsablogs.gsa.gov\/technology\/wp-json\/wp\/v2\/categories?post=3518"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gsablogs.gsa.gov\/technology\/wp-json\/wp\/v2\/tags?post=3518"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}