Copyright Goodheart-Willcox Co., Inc. 107 19. Select the event in the middle pane of the Event Viewer. Look at the details for the event in the General tab at the bottom of the middle pane. The Security ID: entry is the user who changed the file. The program used to access the file is also listed. For example, if Microsoft Word was used to modify the file, the path to winword.exe will be given. 20. Close the Event Viewer. CASE STUDY Alternative Worksites One of the outcomes of the COVID-19 pandemic in early 2020 was the transition to alternative worksites for many employees. Many of these worksites consisted of employees’ homes using personal equipment. As employees shifted to this working environment, the Harvard Business Review published an advisory over the potential increase in cyberattacks. The security consulting company Artic Security subse- quently revealed a global increase of compromised systems since March 2020 due to COVID-related phishing e-mails, a push to issue company equipment quickly, use of personal equipment, lack of technical oversight by employees, and equipment located outside of organization offices. 1. Since many employees were directed to work from home unexpectedly, organizations that issued company-owned equipment may not have fully secured and patched each device. What are some suggestions an IT staff could provide to ensure the business devices are secured, even though they are not onsite? Keep in mind the need for physical distancing measures. 2. List strategies you would recommend to employees to reduce the vulnerabilities of using their personal equipment. 3. Nationwide conducted a small business owner survey in 2019 and found that only four percent of business owners implemented the cybersecurity practices and recommendations outlined by the Small Business Administration. How could an IT department convince management of the importance of strong cybersecurity practices in this unprecedented working environment? 4. Moving forward, it is possible that businesses will be forced to return to this work-from-home model if a similar situation arises. How can companies prepare to protect remote hosts and its own environment should another pandemic occur?
Previous Page Next Page