The Coronavirus doesn’t just impact health and the global economy. It impacts the cybersecurity of our businesses in two ways:
1. Cybercriminals take advantage of chaos and fear by creating pandemic-specific phishing emails and malware campaigns.
2. Local quarantines mean more people are working remotely from home, away from the protection of the office and corporate firewalls.
Learn how to keep your business and employees digitally secure.
We'll cover specific malware and phishing attacks related to COVID 19, talk about the three zones of protection, and provide tactical advice for how to stay secure when working remote. Specifically we'll talk about laptop and device hardening, securing your internet connection, multi-factor authentication, and the importance of a secure personal VPN.
To watch a recording of this talk, visit: https://attendee.gotowebinar.com/recording/4483155713830148877
3. Rubica Cybersecurity
Rubica protects your devices, internet connections, and accounts all in one
app – from anywhere, at work, at home, or on-the-go. Think of us as your
digital bodyguard.
Rubica is advanced cybersecurity for individuals & teams.
Enterprise-grade
Easy to use
Mobile-first security
4. 1. Cybercriminals are taking advantage of chaos & fear by creating pandemic-
specific phishing & malware campaigns.
2. Local quarantines mean more people working remotely, away from the
protection of the office & corporate firewalls.
The Coronavirus Effect on Business
5. Why is this happening?
Context: Cybercrime is global & sophisticated.
7. Coronavirus:
Old tricks, new hooks
Cybercriminals create new lookalike websites & domains to host attacks.
4,000+ new website domains related to Corona in last 3 months.
Corona-themed domains are 50% more likely to be malicious.
Cybercriminals reuse old malware in new packaging.
9. It’s not just email…
Links to Coronavirus maps can
contain malware.
Other tactics:
• SMS: “Your shipment has been
delayed due to the coronavirus”
• Company remote working
policy from your HR/IT
department
• Deals for “cures” or supplies
13. Three Zones of Security
Devices
Internet
Connections
Accounts
To protect your business, all three must be secure.
14. Three Zones of Security
1. Devices
3. Accounts
& Online Services
15. Protection Layer 1:
Harden your laptop
Patch all devices. Schedule automatic updates & book reminders on your
calendar.
Run as a standard user, not an admin. This limits the scope of damage if your
device gets hacked.
Enable full-disk encryption. It doesn’t help much if only part of your disk is
encrypted.
Back up your data. Use a combination of physical and cloud backups. Make
sure they are both encrypted.
Enable software firewalls for an extra layer of protection.
16. Protection Layer 2:
Harden your phone
• Audit app permissions – customize access to location,
microphone, camera, contacts, and e-mail.
• Use your VPN when on wifi.
• Updates apply to phones as well – OS, browser, and all
apps.
• You are more susceptible to phishing and social
engineering on your phone, think before you click.
17. A Corporate VPN is used to access files and services locally hosted in the office but doesn’t cover all
digital tools.
A personal VPN protects your connection away from the office while working offsite, meant to protect
all tools and all devices (including phones).
WORK FILE
SERVER
• EMAIL
• SLACK
• WEB SEARCHES
• BROWSING?
Secure Your Internet Connection
18. Protection Layer 3:
Secure Your Internet Connection
• Choose a VPN that doesn’t sell your data and keep it turned on – for all devices.
• Keep work devices on their own network, preventing the spread of malware from
reaching your home network and your own personal devices.
• Change default router credentials and update your firmware.
• Ensure your WPA2 key is unique, long, and strong.
19. Protection Layer 4:
Use MFA Everywhere
• Multi-factor authentication protects data theft at the
account access level. With MFA for account login, it’s
just much harder to hack.
• Protect your iCloud & Google Play accounts with
MFA. And protect your cell phone account with
your carrier.
• Use it everywhere that it’s offered, especially key
accounts like email, financial accounts, and social
media.
20. Rubica makes it easy to secure your business
Designed for remote work
Built mobile first, and works for all devices
Catches what Antivirus can’t
Brings peace of mind
No hardware needed; download the app and
you’re done
Maintains your privacy
Enterprise-level security that follows you &
your devices
21. Rubica makes it easy to secure your business
Secures your devices +
internet connections + accounts
• Threat detection via anomaly & behavioral traffic
analysis
• Anti-malware
• Anti-phishing (DNS sinkhole)
• Encrypted VPN; secures any cell or wifi network
• Intrusion detection & prevention (IDS/IPS) –
automated threat blocking
• Malicious app detection
22. Every person deserves access to meaningful security and
privacy. Rubica empowers people to protect their digital life.
24. How Rubica Works
1. Download the Rubica App in minutes
2. Turn on your VPN connection to the Rubica
security stack, from anywhere
3. Rubica security stack blocks malware, phishing
and other cyber threats
4. Notifies both the Admin & User about threats
that require action or attention
5. Rubica provides on-call support to the Admin
for any remediation needs
VPN
Threat notifications
3
IPS
IDS
Continuous rule
enhancement
1
2
On-call support
45