Coronavirus: A Threat to Your Staff, Cyberthreat to Your Operations

Coronavirus: A Threat to Your Staff, Cyberthreat to Your Operations

COVID-19, or coronavirus, has been a major global health concern over the past couple of months. At this point, it is clear that this disease could have serious impacts on the workplace. We wanted to provide a brief rundown of good workplace and network health practices, as well as a few pointers on how you can handle health-based employee absences.

How to Minimize General Exposure in the Office

Based on what is currently known about the coronavirus, the Centers for Disease Control and Prevention have some recommendations as to how to keep the potential impact of coronavirus to a minimum:

  • Encourage employees who are ill to stay home. This will help to minimize the spread of infection within your business. Make sure that your employees are aware of this policy by reiterating it verbally, and by posting notices around the office encouraging them to stay home if under the weather.

    Emphasize hygiene and etiquette. Properly stifling coughs and sneezes and keeping hands clean are surprisingly effective ways to keep your workplace healthier. Rather than using their hands to catch a cough or sneeze, your employees should use a tissue or--if unable to do so--use the upper part of their sleeve.

    The CDC recommends that tissues and alcohol-based hand sanitizer should be made readily available. Make sure your employees are washing their hands with soap and water for the recommended 20 seconds.

  • Engage in keeping the workplace clean. There is a chance that coronavirus (and other illnesses) could be spread via infected surfaces. Make sure that all surfaces that are touched frequently, like desks, workstations, and doorknobs, are kept sanitized. Provide your employees with disposable wipes so they can proactively disinfect these surfaces before use.

If you find that one of your employees is confirmed to have been infected with coronavirus, make sure that you inform their coworkers of their possible exposure while still maintaining the confidentiality that the Americans with Disabilities Act requires. These employees and those who are living with a sick family member should assess their risk of exposure using the CDC’s guidelines.

Coronavirus as a Cyberthreat

Unfortunately, coronavirus will also require you to also keep an eye on your network security, particularly if you operate within the healthcare industry. Hackers and cybercriminals have taken advantage of the widespread concern that the disease has caused. For example:

  • Scammers have phished healthcare providers with updates that appear to have come from the World Health Organization or hospitals local to their area, but actually introduce keyloggers into their systems.
  • Those involved in the medical supply chain have been targeted with emails referencing the coronavirus that install malware to steal information.
  • Ransomware has been introduced into consumer systems by promising recipients of an email information about COVID-19’s spread.

While the current climate may not make it easy, these emails and other threat vectors can be overcome through the same best practices that foil other cyberthreats. In addition to comprehensive digital protections, training your employees to spot these threats will be crucial.

Of course, you should also maintain a comprehensive backup in case you need to recover from a successful attack.

How to Maintain Productivity with Your Team at Home

With today’s technology, sending an employee home sick doesn’t necessarily mean that you will be sacrificing that employee’s productivity. We now have many ways that your team can work effectively from home, still contributing to your organizational agenda without exposing their coworkers to their illness.

Equipping Your Employees

Remote access solutions, paired with virtual private networking technology, can allow your employees to securely continue their work from home, safely accessing the applications and data their tasks require through an encrypted connection. As collaboration will certainly be necessary, you will want to be sure that your employees are also equipped with the communication tools that facilitate this collaboration as well.

Network Protections

You will also want to thoroughly secure your network infrastructure to help prevent threats like phishing attacks and other methods from being successful… as well as preparing for a potential breach or emergency with data backups and disaster recovery policies and procedures (including contact information for your employees) to help mitigate a worst-case scenario.

Employee Awareness

Finally, make sure your employees are on the lookout for any suspicious activity that could be a cybercriminal’s attempt at using the coronavirus as a means to an end. Not only should your employees know how to spot these attempts; they should also know the proper procedures for reporting and handling them.

Is the coronavirus scary? At this point, it is safe to say that it is, but does it have to interrupt your business operations entirely? Not if you are properly prepared.

For more assistance in preparing your business for any kind of disaster, reach out to the professionals at BNMC by calling 978-482-2020.


What is COVID-19?

COVID-19, better known as coronavirus, is a respiratory illness that first appeared in Wuhan, China, and was reported in the United States on January 21st, 2020.

As of March 3rd, 12 states have reported 60 total cases of coronavirus and six confirmed deaths, with no vaccines or specific antiviral treatments for the illness. Symptoms of the virus include fever, shortness of breath, and a cough, while those with complications from the virus can experience pneumonia in both lungs, failure of multiple organs, and death. 



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, March 30 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Productivity Privacy Cloud User Tips Network Security Email Microsoft Software Computer Hackers Malware Hosted Solutions Data Google Communication Business Small Business IT Services Efficiency Mobile Devices Tech Term Workplace Tips IT Support Hardware Managed IT Services Internet Cloud Computing Data Recovery Ransomware Backup Innovation Smartphone Smartphones Android Upgrade Outsourced IT Windows Mobile Device Miscellaneous Users Saving Money Facebook Phishing Information Windows 10 Data Backup Server Cybersecurity Office 365 Managed IT Services Social Media Business Continuity Business Management Microsoft Office Network Browser Internet of Things Data Management communications Windows 10 Passwords Productivity VoIP Gadgets App Gmail Disaster Recovery Word Vulnerability Remote Monitoring Managed Service Chrome Quick Tips Apps Infrastructure Artificial Intelligence Encryption Save Money Access Control Applications VPN Employer-Employee Relationship Settings Router Managed Service Provider Virtual Reality Company Culture Analytics Tip of the week Website BYOD Money IT Support Robot Employee-Employer Relationship IT Management Data Security Information Technology Google Drive Automation Content Filtering Remote Workers Bandwidth Virtual Private Network Paperless Office Apple YouTube Education Storage Government Risk Management Unified Threat Management Computers Development Avoiding Downtime Office Tips Hacker Data storage Antivirus Maintenance Display Collaboration Firewall HIPAA Networking Big Data BDR Mobile Security Vendor Management Bring Your Own Device Operating System Monitors WiFi LiFi Solid State Drive Downtime Chromebook Social Wireless Marketing Humor Hosted Solution Server Management Business Intelligence Administration Business Technology Mouse Touchscreen Hard Disk Drive End of Support OneNote Data Breach IT Managed IT Windows 7 Social Network Tablet Remote Computing Software as a Service Augmented Reality SaaS MSP Wi-Fi Data loss Managing Stress Printing Holiday Two-factor Authentication Virtualization Password Telephone Systems desktop Managed IT Service Retail Alert Customer Relationship Management Scam Laptop iOS Break Fix The Internet of Things Outlook Search Document Management Spam Computing Assessment Tech Support Scalability Conferencing Servers Google Calendar Computer Care IBM Solar Virus Emergency File Sharing Smart Tech Managed Services Budget Utility Computing Network Management Work Updates Shadow IT Dark Web Cybercrime Cooperation Service Level Agreement Typing Mixed Reality Memes Cyber Monday Identity Theft Social Engineering Voice over Internet Protocol Device Reducing Cost Hotspot Internet Exlporer Websites Best Practice Migration Consulting Legislation Training Corporate Profile Compliance LED Current Events Threats Connectivity Laptops SharePoint G Suite IT Technicians Optimization PowerPoint Gamification Microsoft Excel Automobile Batteries Techology Dell Staff Leominster Cryptocurrency Smart Technology Modem Safety FinTech Mobility Halloween Language Value Google Docs Statistics WannaCry Regulations IT solutions Co-Managed IT Going Green How To Lenovo Cabling IoT Managed Services Provider Downloads Mirgation Network Congestion Recycling Onboarding Hacks GDPR COVID-19 Mail Merge Blockchain Google Maps Print Toner Google Wallet Myths VoIP Unified Threat Management K-12 Schools Slack Bitcoin Hard Disk Drives Holidays Shortcut Distributed Denial of Service Cookies Scary Stories Computing Infrastructure Professional Services Business Growth Messaging Distribution Bluetooth Comparison Social Networking Writing Content Huawei Firefox Superfish Star Wars Entertainment Legal Vendor Chatbots eWaste Digital Signage Data Warehouse Address Permissions Running Cable Unified Communications Shortcuts Drones Mobile Management User Error Buisness Wearable Technology Dark Data Network upgrade Update Monitoring Windows 8 Solid State Drives Payment Card Patch Management Digital Payment Nanotechnology Disaster Sports Alerts USB Employee-Employer Relationships Logistics Specifications Digital Virtual Desktop Motherboard Cables Streaming Processor Fraud Cost Management Politics Deep Learning Hybrid Cloud Heating/Cooling Multi-Factor Security Identity Continuity Troubleshooting Mobile Device Management Business Analysis Screen Reader Charging Work/Life Balance Security Cameras Profiles Time Management Printer Customer Service Smart Office Spying National Security Inventory Uninterrupted Power Supply Licensing Dongle Private Cloud Analysis Alt Codes Students Asset Management Black Friday Spyware Office Wires Samsung Human Error Memory Black Market Printers Mobile Computing Regulation Law Enforcement Error Point of Sale Ben McDonald shares Electronic Medical Records Notifications Physical Security Twitter Travel Upgrades Gadget Emoji Supercomputer CrashOverride Crowdsourcing Personal Information Botnet Staffing Financial Motion Sickness 3D Printing Taxes Cortana Administrator Web Server what was your? IT Budget Machine Learning GPS Processors Unsupported Software IT Consultant Remote Work Cameras Meetings Computer Repair Relocation Tracking Mobile Data Cleaning How To CCTV Recovery Webcam Health

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3