{"id":78327,"date":"2023-01-09T11:45:49","date_gmt":"2023-01-09T11:45:49","guid":{"rendered":"https:\/\/staging-deveccouncil.kinsta.cloud\/cybersecurity-exchange\/?p=77864"},"modified":"2023-12-26T07:35:14","modified_gmt":"2023-12-26T07:35:14","slug":"the-impact-of-the-covid-19-pandemic-on-cybersecurity-infrastructures","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/whitepaper\/the-impact-of-the-covid-19-pandemic-on-cybersecurity-infrastructures\/","title":{"rendered":"The Impact of the COVID-19 Pandemic on Cybersecurity Infrastructures"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"78327\" class=\"elementor elementor-78327\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4a26c2b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4a26c2b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-70fa103\" data-id=\"70fa103\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1fea984 elementor-hidden-mobile elementor-widget elementor-widget-image\" data-id=\"1fea984\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"#form\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"521\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/3-The-Impact-of-the-COVID-19-Pandemic-on-Cybersecurity-Infrastructures-Desktop.jpg\" class=\"attachment-full size-full wp-image-78396\" alt=\"The-Impact-of-the-COVID-19-Pandemic-on-Cybersecurity-Infrastructures-Desktop\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/3-The-Impact-of-the-COVID-19-Pandemic-on-Cybersecurity-Infrastructures-Desktop.jpg 1024w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/3-The-Impact-of-the-COVID-19-Pandemic-on-Cybersecurity-Infrastructures-Desktop-300x153.jpg 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/3-The-Impact-of-the-COVID-19-Pandemic-on-Cybersecurity-Infrastructures-Desktop-768x391.jpg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-133d1af elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-image\" data-id=\"133d1af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"#form\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"521\" height=\"521\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/mob-The-Impact-of-the-COVID-19-Pandemic-on-Cybersecurity-Infrastructures-Mobile.jpg\" class=\"attachment-full size-full wp-image-78385\" alt=\"he-Impact-of-the-COVID-19-Pandemic-on-Cybersecurity-Infrastructures-Mobile\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/mob-The-Impact-of-the-COVID-19-Pandemic-on-Cybersecurity-Infrastructures-Mobile.jpg 521w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/mob-The-Impact-of-the-COVID-19-Pandemic-on-Cybersecurity-Infrastructures-Mobile-300x300.jpg 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/mob-The-Impact-of-the-COVID-19-Pandemic-on-Cybersecurity-Infrastructures-Mobile-150x150.jpg 150w\" sizes=\"(max-width: 521px) 100vw, 521px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a242ff8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a242ff8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7d47524\" data-id=\"7d47524\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ebd3546 elementor-widget elementor-widget-heading\" data-id=\"ebd3546\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">The Impact of the COVID-19 Pandemic on Cybersecurity Infrastructures<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-971c440 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"971c440\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-1dbc424\" data-id=\"1dbc424\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-690297b elementor-widget elementor-widget-post-info\" data-id=\"690297b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-a4968b2 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>January 9, 2023<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-5dadb57 elementor-inline-item\">\n\t\t\t\t\t\t<a href=\"#author\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\tZahidur Rahman \t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-45dc397 elementor-inline-item\">\n\t\t\t\t\t\t<a href=\"\/cybersecurity-exchange\/ethical-hacking\/\" target=\"_blank\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\tEthical Hacking\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-98432b8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"98432b8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6abf6b0\" data-id=\"6abf6b0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6201be8 elementor-widget elementor-widget-text-editor\" data-id=\"6201be8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The COVID-19 pandemic has had a profound impact on the way people live and work around the world. One of the areas that have been significantly affected is the cybersecurity infrastructure. In this whitepaper, the author, Mohammad Zahidur Rahman, an Information Security Specialist at Southeast Bank Limited, examines the impact of the pandemic on cybersecurity infrastructures and provides insights into how organizations can enhance their cybersecurity posture.<\/p><p>The pandemic has accelerated the shift towards remote work, which has led to an increase in the use of virtual private networks (VPNs) and cloud-based applications. However, this has also increased the attack surface for cybercriminals. The paper notes that cybercriminals have exploited the pandemic by using COVID-19-themed phishing emails, malware, and ransomware attacks to target individuals and organizations. In addition, this whitepaper highlights that using personal devices for work has also increased the risk of data breaches.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a7bbcf elementor-widget elementor-widget-image\" data-id=\"6a7bbcf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1000\" height=\"1500\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/01\/from-phising-to-ransomware.jpg\" class=\"attachment-full size-full wp-image-78596\" alt=\"from phising to ransomware\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/01\/from-phising-to-ransomware.jpg 1000w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/01\/from-phising-to-ransomware-200x300.jpg 200w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/01\/from-phising-to-ransomware-683x1024.jpg 683w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/01\/from-phising-to-ransomware-768x1152.jpg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-db62f74 elementor-widget elementor-widget-text-editor\" data-id=\"db62f74\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The whitepaper also emphasizes the importance of employee awareness and education to mitigate the risks posed by cyber threats. Organizations need to implement effective security awareness training programs to educate their employees on identifying and responding to cyber threats. It also recommends using multi-factor authentication and other security measures to prevent unauthorized access to sensitive data.<\/p><p>Another area that the paper explores is the impact of the pandemic on supply chain security. With the disruption in global supply chains, organizations increasingly rely on third-party vendors and suppliers for their products and services. This has increased the risk of supply chain attacks, where cybercriminals target weak points in the supply chain to gain access to sensitive information. The whitepaper recommends that organizations assess the security posture of their vendors and suppliers and implement appropriate measures to mitigate the risks.<\/p><p>The whitepaper also notes that the pandemic has highlighted the importance of disaster recovery and business continuity planning. With the increase in remote work, organizations need to ensure that their disaster recovery and business continuity plans are current and can support a remote workforce. This includes ensuring that employees can access the necessary tools and resources to work remotely and that critical data is backed up and accessible.<\/p><p>Finally, the whitepaper recommends that organizations adopt a risk-based approach to cybersecurity. This involves identifying and prioritizing the most significant risks and implementing appropriate mitigation measures. The paper notes that organizations must develop a comprehensive risk management framework that includes regular risk assessments, vulnerability scans, and penetration testing to identify and address vulnerabilities.<\/p><p>In conclusion, the COVID-19 pandemic has significantly impacted cybersecurity infrastructures, and organizations need to adapt to the new realities of remote work and heightened cyber threats. The whitepaper provides valuable insights into how organizations can enhance their cybersecurity posture and mitigate the risks posed by cyber threats. By implementing effective security awareness training programs, adopting multi-factor authentication and other security measures, assessing the security posture of their vendors and suppliers, developing disaster recovery and business continuity plans, and adopting a risk-based approach to cybersecurity, organizations can strengthen their cybersecurity defenses and protect their critical assets.<\/p><p>To download EC-Council&#8217;s whitepaper on The Impact of the COVID-19 Pandemic on Cybersecurity Infrastructures, please submit your details in the form below.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The Impact of the COVID-19 Pandemic on Cybersecurity Infrastructures The COVID-19 pandemic has had a profound impact on the way people live and work around the world. One of the areas that have been significantly affected is the cybersecurity infrastructure. In this whitepaper, the author, Mohammad Zahidur Rahman, an Information Security Specialist at Southeast Bank&hellip;<\/p>\n","protected":false},"author":46,"featured_media":78385,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12228],"tags":[12256,12257,12258,199,12259,12260,12261,12262,12263,12250,12264,12265,12266,31,12267,12255],"class_list":{"0":"post-78327","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-whitepaper","8":"tag-covid19","9":"tag-cyberattacks","10":"tag-cyberresilience","11":"tag-cybersecurity","12":"tag-cyberthreats","13":"tag-dataprotection","14":"tag-digitalsecurity","15":"tag-informationsecurity","16":"tag-infrastructure","17":"tag-itsecurity","18":"tag-networksecurity","19":"tag-remotework","20":"tag-riskmanagement","21":"tag-security","22":"tag-vulnerabilitymanagement","23":"tag-whitepaper"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Impact of the COVID-19 Pandemic on Cybersecurity Infrastructures - EC-Council<\/title>\n<meta name=\"description\" content=\"This whitepaper discusses the impact of the COVID-19 pandemic on cybersecurity industry, and challenges associated with the changes during the effect.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/whitepaper\/the-impact-of-the-covid-19-pandemic-on-cybersecurity-infrastructures\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Impact of the COVID-19 Pandemic on Cybersecurity Infrastructures\" \/>\n<meta property=\"og:description\" content=\"This whitepaper discusses the impact of the COVID-19 pandemic on cybersecurity industry, and challenges associated with the changes during the effect.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/whitepaper\/the-impact-of-the-covid-19-pandemic-on-cybersecurity-infrastructures\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-09T11:45:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-26T07:35:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/mob-The-Impact-of-the-COVID-19-Pandemic-on-Cybersecurity-Infrastructures-Mobile.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"521\" \/>\n\t<meta property=\"og:image:height\" content=\"521\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mohammad Zahidur Rahman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mohammad Zahidur Rahman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/the-impact-of-the-covid-19-pandemic-on-cybersecurity-infrastructures\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/the-impact-of-the-covid-19-pandemic-on-cybersecurity-infrastructures\\\/\"},\"author\":{\"name\":\"Mohammad Zahidur Rahman\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/564945cb753dce603a492f9fa078e52b\"},\"headline\":\"The Impact of the COVID-19 Pandemic on Cybersecurity Infrastructures\",\"datePublished\":\"2023-01-09T11:45:49+00:00\",\"dateModified\":\"2023-12-26T07:35:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/the-impact-of-the-covid-19-pandemic-on-cybersecurity-infrastructures\\\/\"},\"wordCount\":541,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/the-impact-of-the-covid-19-pandemic-on-cybersecurity-infrastructures\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/mob-The-Impact-of-the-COVID-19-Pandemic-on-Cybersecurity-Infrastructures-Mobile.jpg\",\"keywords\":[\"COVID19\",\"cyberattacks\",\"cyberresilience\",\"cybersecurity\",\"cyberthreats\",\"dataProtection\",\"digitalsecurity\",\"InformationSecurity\",\"infrastructure\",\"ITSecurity\",\"networksecurity\",\"remoteWork\",\"RiskManagement\",\"security\",\"vulnerabilityManagement\",\"Whitepaper\"],\"articleSection\":[\"Whitepaper\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/the-impact-of-the-covid-19-pandemic-on-cybersecurity-infrastructures\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/the-impact-of-the-covid-19-pandemic-on-cybersecurity-infrastructures\\\/\",\"name\":\"The Impact of the COVID-19 Pandemic on Cybersecurity Infrastructures - EC-Council\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/the-impact-of-the-covid-19-pandemic-on-cybersecurity-infrastructures\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/the-impact-of-the-covid-19-pandemic-on-cybersecurity-infrastructures\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/mob-The-Impact-of-the-COVID-19-Pandemic-on-Cybersecurity-Infrastructures-Mobile.jpg\",\"datePublished\":\"2023-01-09T11:45:49+00:00\",\"dateModified\":\"2023-12-26T07:35:14+00:00\",\"description\":\"This whitepaper discusses the impact of the COVID-19 pandemic on cybersecurity industry, and challenges associated with the changes during the effect.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/the-impact-of-the-covid-19-pandemic-on-cybersecurity-infrastructures\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/the-impact-of-the-covid-19-pandemic-on-cybersecurity-infrastructures\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/the-impact-of-the-covid-19-pandemic-on-cybersecurity-infrastructures\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/mob-The-Impact-of-the-COVID-19-Pandemic-on-Cybersecurity-Infrastructures-Mobile.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/mob-The-Impact-of-the-COVID-19-Pandemic-on-Cybersecurity-Infrastructures-Mobile.jpg\",\"width\":521,\"height\":521,\"caption\":\"he-Impact-of-the-COVID-19-Pandemic-on-Cybersecurity-Infrastructures-Mobile\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/the-impact-of-the-covid-19-pandemic-on-cybersecurity-infrastructures\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Whitepaper\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/whitepaper\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"The Impact of the COVID-19 Pandemic on Cybersecurity Infrastructures\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/564945cb753dce603a492f9fa078e52b\",\"name\":\"Mohammad Zahidur Rahman\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Impact of the COVID-19 Pandemic on Cybersecurity Infrastructures - EC-Council","description":"This whitepaper discusses the impact of the COVID-19 pandemic on cybersecurity industry, and challenges associated with the changes during the effect.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/whitepaper\/the-impact-of-the-covid-19-pandemic-on-cybersecurity-infrastructures\/","og_locale":"en_US","og_type":"article","og_title":"The Impact of the COVID-19 Pandemic on Cybersecurity Infrastructures","og_description":"This whitepaper discusses the impact of the COVID-19 pandemic on cybersecurity industry, and challenges associated with the changes during the effect.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/whitepaper\/the-impact-of-the-covid-19-pandemic-on-cybersecurity-infrastructures\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2023-01-09T11:45:49+00:00","article_modified_time":"2023-12-26T07:35:14+00:00","og_image":[{"width":521,"height":521,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/mob-The-Impact-of-the-COVID-19-Pandemic-on-Cybersecurity-Infrastructures-Mobile.jpg","type":"image\/jpeg"}],"author":"Mohammad Zahidur Rahman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mohammad Zahidur Rahman","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/whitepaper\/the-impact-of-the-covid-19-pandemic-on-cybersecurity-infrastructures\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/whitepaper\/the-impact-of-the-covid-19-pandemic-on-cybersecurity-infrastructures\/"},"author":{"name":"Mohammad Zahidur Rahman","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/564945cb753dce603a492f9fa078e52b"},"headline":"The Impact of the COVID-19 Pandemic on Cybersecurity Infrastructures","datePublished":"2023-01-09T11:45:49+00:00","dateModified":"2023-12-26T07:35:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/whitepaper\/the-impact-of-the-covid-19-pandemic-on-cybersecurity-infrastructures\/"},"wordCount":541,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/whitepaper\/the-impact-of-the-covid-19-pandemic-on-cybersecurity-infrastructures\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/mob-The-Impact-of-the-COVID-19-Pandemic-on-Cybersecurity-Infrastructures-Mobile.jpg","keywords":["COVID19","cyberattacks","cyberresilience","cybersecurity","cyberthreats","dataProtection","digitalsecurity","InformationSecurity","infrastructure","ITSecurity","networksecurity","remoteWork","RiskManagement","security","vulnerabilityManagement","Whitepaper"],"articleSection":["Whitepaper"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/whitepaper\/the-impact-of-the-covid-19-pandemic-on-cybersecurity-infrastructures\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/whitepaper\/the-impact-of-the-covid-19-pandemic-on-cybersecurity-infrastructures\/","name":"The Impact of the COVID-19 Pandemic on Cybersecurity Infrastructures - EC-Council","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/whitepaper\/the-impact-of-the-covid-19-pandemic-on-cybersecurity-infrastructures\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/whitepaper\/the-impact-of-the-covid-19-pandemic-on-cybersecurity-infrastructures\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/mob-The-Impact-of-the-COVID-19-Pandemic-on-Cybersecurity-Infrastructures-Mobile.jpg","datePublished":"2023-01-09T11:45:49+00:00","dateModified":"2023-12-26T07:35:14+00:00","description":"This whitepaper discusses the impact of the COVID-19 pandemic on cybersecurity industry, and challenges associated with the changes during the effect.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/whitepaper\/the-impact-of-the-covid-19-pandemic-on-cybersecurity-infrastructures\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/whitepaper\/the-impact-of-the-covid-19-pandemic-on-cybersecurity-infrastructures\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/whitepaper\/the-impact-of-the-covid-19-pandemic-on-cybersecurity-infrastructures\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/mob-The-Impact-of-the-COVID-19-Pandemic-on-Cybersecurity-Infrastructures-Mobile.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/mob-The-Impact-of-the-COVID-19-Pandemic-on-Cybersecurity-Infrastructures-Mobile.jpg","width":521,"height":521,"caption":"he-Impact-of-the-COVID-19-Pandemic-on-Cybersecurity-Infrastructures-Mobile"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/whitepaper\/the-impact-of-the-covid-19-pandemic-on-cybersecurity-infrastructures\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Whitepaper","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/whitepaper\/"},{"@type":"ListItem","position":4,"name":"The Impact of the COVID-19 Pandemic on Cybersecurity Infrastructures"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/564945cb753dce603a492f9fa078e52b","name":"Mohammad Zahidur Rahman"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/78327","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=78327"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/78327\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/78385"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=78327"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=78327"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=78327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}