Attivo Networks Blogs

Why COVID-19 has been good news for cybercriminals

It wire logo

The rush to have staff working remotely has created numerous opportunities for cybercriminals to infiltrate corporate networks. These opportunities are due to people no longer working within a protected infrastructure, using insecure networks, and connecting through client devices that lack vital security patches.

It’s tempting for organisations to think that, because they have managed to navigate the initial lockdowns without any sign of a cyberattack, they are now in the clear. Unfortunately, this may not be the case.

There could well be attackers who have gained access to corporate infrastructures but have opted to lie low as they prepare their next steps. It’s quite likely that a new wave of attacks will emerge as these criminals make their presence known. Interestingly, industry studies show that the dwell time – the period that attackers spend inside the network before detection – is now just under 60 days. However, it can extend into months or even years for more advanced attacks. It may currently be the calm before the storm.

Read the complete article by Jim Cook on IT Wire.

Share on:

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free


Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

ADSecure 90-Day Free Trial


  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise


Leave a Comment

Your email address will not be published.

seventeen − fifteen =

Ready to find out what’s lurking in your network?

Scroll to Top