

Time is the most precious resource in a situation where threats are directly impacting key services and assets. Most importantly, containment can buy enough time so that we can get our other defences ready. Like firewalls, these containment controls are about managing and reducing the threat. Quarantine, especially on a large scale, isn’t expected to stop a pandemic in its tracks. However, given all these controls, no one who’s worked in the cybersecurity world for any length of time would expect them to work perfectly.ĭoes this mean we should throw away our firewalls? The answer is no.

And lastly, there are imposed travel restrictions with checkpoints, which are comparable to how we use decryption and traffic inspection to filter out threats. There is tracking of the person-to-person contact of infected individuals, which is similar to how we log and monitor. There are quarantines applied to geographic areas, which are analogous to how we use network segmentation with firewalls. First, there is the isolation of infected individuals, which is similar to how we use anti-malware and bot-detection tools to lock down specific machines. It’s worth examining what pandemic containment involves. But the reality, as we are now seeing, is that quarantines leak, and viruses often begin to spread anyway. The concept is simple: nothing leaves, and therefore the threat is bottled up. One of the first moves in pandemic response is to issue a quarantine to contain the spread of the virus.

In light of the current pandemic, non-essential workers all over the world have been sent home and cybercriminals know this, which is why it is vital that organisations ensure they have the right processes and procedures in place to protect their workforce. Here, Raymond Pompon, Director of F5 Labs, explains why © Jakub Jirsák | As cybersecurity experts begin to adapt to remote working, it is worth noting that there are strong parallels between a pandemic response and handling cybersecurity threats.
