Skip to main content
FoxPointe FoxPointe
  • Services
    • Cyber Risk, Assurance and Compliance
    • IT Audit
    • Penetration Testing
    • General Consulting
    • Virtual Chief Information Security Officer (vCISO)
  • About Us
    • Management Team
    • Credentials
    • Careers
  • Resources
    • Events
    • News
    • Videos
    • Whitepapers
  • Blog
  • Contact Us
FoxPointe
  • Services
    • Cyber Risk, Assurance and Compliance
    • IT Audit
    • Penetration Testing
    • General Consulting
    • Virtual Chief Information Security Officer (vCISO)
  • About Us
    • Management Team
    • Credentials
    • Careers
  • Resources
    • Events
    • News
    • Videos
    • Whitepapers
  • Blog

Enter Keywords

  1. Home
  2. Blog

FoxPointe Security Hub

COVID-19: Putting Things in Perspective for One Cybersecurity Professional

March 25, 2020

In all of my years in information technology and information security, I was trained to reduce the risks of a computer virus. Never in my wildest imagination did I think I would have to deal with risks related to a different type of virus – a biological one.

While it may not be apparent at a first glance, computer viruses and biological viruses share many the same traits:

  • Biological viruses get their instructions from DNA or RNA, while computer viruses get theirs from computer programming.
  • Typically, biological viruses cannot live for too long outside of their hosts, while computer viruses are activated when the host program is executed.
  • Biological viruses replicate themselves by taking over the hosts internal “machinery” with its own DNA/RNA, while a computer virus is able to replicate itself when the host program is executed.
  • Copies of the biological virus infect other host cells while copies of computer viruses attach to/infect other host programs.

Many biological viruses, such as COVID-19, take a significant human toll from a physical and emotional standpoint. As we are seeing today, COVID-19 is also affecting our financial markets. It’s clear, based on all that has been reported, that this virus will involve a lot of hard work and sacrifice to recover from. At the same time, and on a different scale, a computer virus affects humans through the loss of productivity, and the potential loss of revenue that can occur in the event of a ransomware attack. Finally, depending on the severity of the computer virus, it too can take significant time to recover from.

As a security professional, COVID-19 has taught me not to take my job too seriously. Yes, information security is one of the most important functions for businesses to keep our information safe, but to the best of my knowledge, no one has been hospitalized or lost their life due to being in direct contact with a computer virus. COVID-19 has reminded me of what’s really important in life: family, friends, clients, and our health. I’m amazed and proud to see how businesses and colleagues have come together to support each other and those affected either directly or indirectly by COVID-19. There is no doubt that we will get through this and be much better for it on the other side.

Remember to wash your hands frequently, maintain a good social distance and take care of each other during these difficult times.

FoxPointe Solutions is solely responsible only for the content of FoxPointe Solutions authored information and is subject to change at any time. Any forward-looking statements are not predictions. FoxPointe Solutions is not responsible for any errors or omissions, or for the results obtained from the use of this information. Questions regarding your legal or compliance position should be addressed through your legal counsel, security advisor and/or your relevant standard authority. Nothing contained herein should be used nor relied upon as advice nor constitute a consultant-client relationship.

Subscribe

Subscribe to receive new articles and resources from our information risk management experts directly in your inbox as soon as they're available.

Subscribe Now

Archive   Archive
Share
Twitter Facebook LinkedIn
  • Topics
  • Authors
  • Data Security (13)
  • Data Privacy (15)
  • Compliance (4)
  • Risk Management (8)
  • Cybersecurity Alert (7)
  • Cybersecurity (25)
  • Archive (34)
  • Charlie Wood | PCI QSA, CISA, CRISC, CISM
  • Carl Cadregari | CISA, CCSFP, CTPRP
  • Allison Hall | PCIP, CCSFP
  • Courtney Caryl | CCSFP, CHQP
Let us show you how we can help
Request Quote
FoxPointe

171 Sully's Trail
Pittsford, NY 14534

Call 844-726-8869
or Contact Us

Subscribe to the Blog

Services
Cyber Risk, Assurance and ComplianceIT AuditPenetration TestingGeneral ConsultingVirtual Chief Information Security Officer (vCISO)
Company
Management TeamAbout UsBlogCareersPrivacy Policy
©2023 FoxPointe
Website by Corporate Communications, Inc.
We use cookies and other technologies to optimize site functionally, analyze website traffic, and share information with our service and analytics partners. To view our Privacy Policy, which discusses cookies, click here. By continuing to use & browse our services, you agree to our Privacy Policy, our use of cookies, and the Terms and Conditions.