Detroit Regional Chamber > Business Resources > COVID-19 > Watch: Network Distancing to Protect Your Virtual Workforce

Watch: Network Distancing to Protect Your Virtual Workforce

June 12, 2020

< Back to Full Restart Michigan Webinar Schedule 

This discussion will go well beyond basic antivirus services. Now is the time to consider endpoint protection platforms (EPPs) and managed endpoint detection and response (EDR) solutions. Participants will gain valuable insight on the cyber risks associated with the COVID-19 outbreak and what you can do to protect your organization and your employees.


Norman Comstock, Managing Director, UHY Consulting

As more companies choose to keep their employees working from home to practice social distancing despite the eased stay-at-home orders, companies should not discount the cybersecurity risks that come with the increased use of virtual technology. UHY Consulting expert Norman Comstock, managing director, gave an overview for Detroit Regional Chamber members in a Restart Webinar on how to protect employees and the company from cyber-attacks.

Threats to a Virtual Workforce

The COVID-19 pandemic has caused the largest remote workforce in history, and for many, this is their first time working from home. Because of high anxiety due to the coronavirus, employees could be especially vulnerable to malware campaigns. The FBI has already received reports of a malware campaign linked to COVID-19 which appears as Microsoft support services.

Damages caused by COVID-19 malware:

  • Wiping computers
  • Rewriting master boot records
  • Change the DNS server configuration on home routers

Managing Cyber-attack Response

Video conferencing sites like Zoom and cloud-based communications could also have vulnerabilities. Businesses should not assume that because no cybersecurity breach seems to exist currently that there isn’t one happening that we can’t see. All companies have unknown vulnerabilities to cyber-attacks.

Slow detection will not allow time for an antiquate response to a cyber-threat. Building a Security Operations Center (SOC) takes time and significant capital, noted Comstock. Companies can save time and money by building SOC-like capabilities instead, focusing on building detection and response capabilities. Businesses should focus on creating a plan with these three steps:

Protect – Implement cybersecurity awareness training, virtual workforce management, monitor user accounts, and ensure backups are secure.

Detect – Monitor inbound and outbound network traffic and monitor endpoints within the network and those leaving or rejoining.

Respond – Investigate incidents immediately, quarantine endpoints as needed, and update firewall rules.

< Back to Full Restart Michigan Webinar Schedule