Skip to main content

19. Impact of COVID-19 on Technology and Cyber Security.

The world is experiencing the economic breakdown and is trying to cope up with basic amenities required for the people to survive. The COVID-19 has even challenged the economy and is affecting all the sectors. Lockdown has proved to be a solution to stop the virus transmission but is affecting the industry. But what are its impacts on technology? 

The effects of COVID-19 are having a significant impact on the technology sector, affecting raw materials supply, disrupting the electronics value chain, and causing an inflationary risk on products. More positively, the disruption has caused an acceleration of remote working, and a rapid focus on evaluating and de-risking the end-to-end value chain. In addition, potential carbon emission reductions could result in renewed focus on sustainability practices. This article considers the shifting landscape across a number of areas.

Google launches COVID-19 page and search portal with safety tips ...

The main impact will be on the cybersecurity and even on supply chain. As due to this pandemic situation, the offices are shut down and the employees are asked to work from home.

Many sectors like hardware, software, IT services and others are affecting in all different ways.

Hardware/software: 
The launch of new smartphones may be deferred due to supply chain constraints. Mobile phone users on contracts may defer replacing their devices due to lower consumer confidence. While factories in Asia are reopening, companies are experiencing challenges getting production fully running. The short- and potential long-term impact could be significant. In contrast to the parts shortage and unpredictability of supply chains dragging down the industry, software is a growth catalyst. Companies with remote-working technologies are already seeing increased demand as businesses increase their remote-working capabilities. Security software will see third-order benefits from a growing remote workforce. IT spending on security software will increase as organizations race to secure endpoints, particularly cloud-based tools, log management, and VPNs. Hardware companies may see major demand coming from enterprises, who are placing large orders for laptops and mobility devices to support employees now working from home. 

IT services: 
IT spending forecasts indicate continued demand for cloud infrastructure services, and potential increases in spending on specialized software. Forecasts also anticipate increased demand for communications equipment and telecom services as organizations encourage employees to work from home, and schools move to online courses. Most organizations do not have a tech stack in place for a reliable business-continuity plan (BCP). Due to enhanced remote work scenarios, IT departments will play a larger role in future BCPs, and will need help from IT service providers in procuring devices, setting up a resilient, flexible and secure network, disaster recovery systems, IT security, etc. The need for ever-faster access to data and automation will enhance the focus on network equipment and communications as never before, speeding up SG network deployments and adoption of SG equipment. 

Some conditions like the limitation over the assets operating from work from home, unavailability of securities on WFH situation, unsecure connection due to connection to free WiFi or any unknown hotspot can prove to be a problem. Many have limited data pack for internet consumption which limits the person to share and utilise the work related services. Non complaint office policies even plays vital role to restrict employee for giving his best. Enhanced surveillance and monitoring tools are not available in most of the cases. Enhanced server and network connection is missing too. The companies of manufacturing sector are not able to work beyond designing and procurement enquiries. 
 


The work from home paradox has two sides:
1: Infrastructure - The working person requires a stable internet connectivity, a space to work independently and work on ideas, managing the teams and implementing different strategies to work on.
2: Risks - Browsing different sites while working may prove to be a danger because of no protection or less protection due to un-updated antivirus, disabled firewall, etc. Phishing over the personal mobiles and laptops or working devices are more because of insecure internet connection. No HA firewall is also a problem.
(High availability (HA) is a deployment in which two firewalls are placed in a group and their configuration is synchronized to prevent a single point of failure on your network. A heartbeat connection between the firewall peers ensures seamless failover in the event that a peer goes down)

Build a Better Firewall-Linux HA Firewall Tutorial

                                                       (Source: Internet)


The dual authentication is required for the cloud, encryption for the drives and the knowledge to access any unknown site is missed. Wireless and unwanted application gets downloaded and may prove to steal the confidential data from the working devices.

Many large companies have server backups. But for the smaller organisation, the server is not used and hence the server backup is not practiced. This even limits to sharing the data between the employees. 

Maintain data security when staff is working from home | TechCrunch

But even for all these negative impacts, the positive impact are visible, Like a employee can work more on strengths and weaknesses of himself and bring out the best from himself. A positive communication and relation is reestablished between the employee and his family and also with the organisation. The organisation now gets to work on its necessary and non essential resources and sort out the required as per its requirements. Many employees got the different views and ideas to convey their ideas from different platform during the lockdown. 

The organisation even has developed the training sessions to bring out the best from its employees. Many are utilising the time to develop newer skills and brush up the old ones. 

This COVID-19 is going to bring out the best of us all and technology for sure!!

Comments

Popular posts from this blog

17- QR code vs SnapTag

Are you tired of seeing those ugly black and white square blots everywhere you look? Well now there is a solution; SnapTags.  SnapTags are raising the bar for interactive communication. SnapTags work like QR codes but give you much more. Instead of using a 2-D barcode, you now are able to use your very own logo that’s much more visually appealing to the consumer. This branding tool is extremely powerful for initiating consumer engagement at which the consumer is likely triggered by an emotional response. QR code (abbreviated from Quick Response Code) is the trademark for a type of matrix barcode. A barcode is a machine-readable optical label that contains information about the item to which it is attached. SnapTag provides trackable, device-aware, fully programmable QR codes that can deliver the best experience in any situation, for everyone. How is the look of snaptag? Well, here it is! Sample model This look is the basic snaptag model of this blog. This tag can be...

18- Basics of Telecommunication

Ever wondered what actually is Telecom? What are its components? How they work? Read below for the same. What is Telecom? Telecommunications ("telecom") is a general term for a vast array of technologies that transmit and receive voice, data, and video information over varying distances through electronic means. The utilization of these networks and technologies varies greatly from organization to organization and may include:     Local, long distance, and toll-free voice traffic     Internet access     Video conferencing     LAN's and WAN's     Call centres     Converged networks (voice, data, wireless) How do mobile phones work? Mobile phones operate within a network based on services which are provided by Telecommunications Service Providers (TSPs). In short, mobile phones search for signals in order to operate. This is enabled through cell towers, which are cellular telephone sites w...