As the Covid19 pandemic ripped across the globe impacting our health, politics and our ability to continue to work. Companies have been forced to shut down or otherwise present an opportunity for remote work. For some companies, that impact may have seemed minimal, due to already having a remote workforce. For others, the task of enabling remote work came with a lot of technical problems, support issues, and quite a few mistakes along the way. This type of chaotic situation, is exactly what the predatory threat actors today are looking for. The mass confusion can lend itself to unauthorized bypass, internal reconnaissance and eventuate to exfiltration of critical data.
During these critical moments it is absolutely vital to assess your critical assets, understand how your threat landscape has changed and perform routine threat hunts to identify anomalous behavior or unauthorized changes introduced to the environment.