Skip to main content

COVID-19: Thwarting Opportunistic Attackers Technical Checklist

April 02, 2020

From phishing to ransomware and malicious domains, cyber attackers are seizing the opportunity to capitalize on COVID-19. Taking steps to protect your work-from-home (WFH) and enterprise environments is critical to minimize risk. Focusing on mobile device security, social activities, network monitoring and multifactor authentication (MFA) helps security teams react quickly. This technical checklist breaks down the steps you can take within each of these areas to harden security and expedite response times.

Download

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.


Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.

Subscribe

Communication Signup

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.