{"id":67828,"date":"2020-05-04T11:30:58","date_gmt":"2020-05-04T09:30:58","guid":{"rendered":"https:\/\/www.hiig.de\/?p=67828"},"modified":"2023-03-28T17:06:15","modified_gmt":"2023-03-28T15:06:15","slug":"the-coronavirus-pandemic-and-its-impact-on-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.hiig.de\/en\/the-coronavirus-pandemic-and-its-impact-on-cybersecurity\/","title":{"rendered":"The coronavirus pandemic and its impact on cybersecurity"},"content":{"rendered":"\n<p><em>The coronavirus pandemic has impacted cybersecurity in several ways. The challenges range from the infrastructure of the internet itself to the spread of disinformation online. Nevertheless, not all is lost, as, at the same time, valuable lessons can be learned for the future.<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>The coronavirus pandemic has changed society\u2019s way of life in several ways, but some of the most remarkable changes have occurred in the digital realm. Due to social distancing measures, more people have needed to go online, and several services have been forced to either digitalise or increase their online presence. This has revealed two things. On the one hand, the <a href=\"https:\/\/www.oxfordreference.com\/view\/10.1093\/oi\/authority.20110803100003718\">information society<\/a> is resilient, as it can maintain a certain degree of productivity and human interaction through digital means. Still, on the other hand, the sudden and massive move to the online environment was anything but smooth. Thus, we are experiencing a chaotic situation in the physical world and in cyberspace, a situation that involves both state and non-state actors.<\/p>\n\n\n\n<p>The challenges are abundant and are related to: (a) infrastructural limits, (b) the increase in cybercriminal activity (d) the growth of surveillance and espionage, and (d) the spread of disinformation online. Therefore, despite the marginal attention paid to it during the first stages of the outbreak, <a href=\"https:\/\/www.itgovernance.co.uk\/blog\/do-you-know-the-difference-between-cyber-security-and-information-security\">cybersecurity<\/a> is emerging as an essential tool to cope with society\u2019s new demands. This article will briefly discuss the form these challenges are taking and what we can learn from them to pave a better way towards the \u201cnew normal\u201d.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The challenges <\/strong><\/h3>\n\n\n\n<p>One of the first challenges that concern cybersecurity specialists relates to the cyberspace infrastructure itself. With the increasing dependence on the internet, its importance has changed, along with the possibility of its disruption. The growing numbers of people going online is increasing pressure on the internet\u2019s infrastructure. This pressure, coupled with potential bottlenecks (such as home-office Wi-Fi, national internet exchange points (IXPs), seabed cables, and cloud servers), is making it more vulnerable to directed cyberattacks (DiploFoundation, 2020). A large-scale <a href=\"https:\/\/www.digitalattackmap.com\/understanding-ddos\/\">DDoS<\/a> attack, for instance, could paralyse the provision of essential goods or services in the pandemic.<\/p>\n\n\n\n<p>Another challenge relates to online criminal activity. Cybercriminals are exploiting people\u2019s fear and curiosity about the coronavirus to conduct cyberattacks. These illegal activities include phishing attacks, malware distribution, and cyberattacks against remote access or remote working infrastructure (NCSC; CISA, 2020 p.3). According to Check Point (2020), since mid-February, there has been an increase in coronavirus-related cyberattacks from a few hundred daily to as high as over 5,000 on 28 March (an average of 2,600 attacks daily).<\/p>\n\n\n\n<p>A third challenge relates to surveillance and espionage, with governments tracking people\u2019s movement to control the spread of infections (Marson; Stupp; Hinshaw, 2020) and advanced persistent threat (APT) groups, potentially related to states, conducting espionage campaigns (Thales, 2020). This challenge demands an open debate within society on the terms of accessing data from digital devices; it also demands efforts to curb data leaks to malicious actors.<\/p>\n\n\n\n<p>Finally, there is what the World Health Organization (WHO) named as an \u201c<a href=\"https:\/\/www.bbc.com\/news\/technology-51497800\">infodemic<\/a>\u201d. In other words, there has been a high spread of disinformation online related to COVID-19. According to an unpublished report from the US Global Engagement Center, \u201croughly 2 million tweets peddled conspiracy theories about the coronavirus over the three weeks when the outbreak began to spread outside China\u201d (Romm, 2020). This online disinformation may not only give rise to distrust among people and governments, or even international institutions, but may also impede efforts to contain the disease as it may lead people to make poor judgments.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The lessons<\/strong><\/h3>\n\n\n\n<p>It is clear that cybersecurity is important in the current context and that the challenges to overcome are not easy ones. Thus, the first lesson is that the digitalisation of goods and services is here to stay, and the development of digital infrastructure must take <a href=\"https:\/\/www.logicworks.com\/blog\/2017\/01\/what-is-security-by-design\/\">security by design<\/a> as fundamental. Another lesson relates to prevention. It is much easier and cheaper to curb cyberattacks if we can prevent the <a href=\"https:\/\/www.varonis.com\/blog\/cyber-kill-chain\/\">cyber kill chain<\/a> from the beginning. However, for prevention to happen, a generalized <a href=\"https:\/\/digitalguardian.com\/blog\/what-cyber-hygiene-definition-cyber-hygiene-benefits-best-practices-and-more\">cyber-hygiene<\/a> culture should be implemented, both in private and public institutions.&nbsp;<\/p>\n\n\n\n<p>A third lesson comes from observing how the joint forces of government and the private sector are being developed to tackle disinformation online. It will be possible to recalibrate what works and what does not in a post-crisis scenario, to create perhaps permanent \u201cmixed agencies\u201d that could improve security online.<\/p>\n\n\n\n<p>Finally, the aspect of surveillance and espionage can teach us the importance of an open and inclusive discussion on cybersecurity with diverse stakeholders. Transparency leads to trust. Trust can lead people to accept some actions better and to accord a degree of legitimacy to them. Then, as these actions are regarded as legitimate, a proportional design becomes possible, like their adaptation for use in non-crisis times.<\/p>\n\n\n\n<p>How these lessons will be implemented in practice remains to be seen. What we can be sure of is that we can come out of the pandemic better than we entered it,&nbsp; at least when it comes to cybersecurity.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<div class=\"lyte-wrapper\" style=\"width:420px;max-width:100%;margin:5px auto;\"><div class=\"lyMe\" id=\"WYL_UHnVIxOfTOg\"><div id=\"lyte_UHnVIxOfTOg\" data-src=\"https:\/\/www.hiig.de\/wp-content\/plugins\/wp-youtube-lyte\/lyteCache.php?origThumbUrl=%2F%2Fi.ytimg.com%2Fvi%2FUHnVIxOfTOg%2Fhqdefault.jpg\" class=\"pL\"><div class=\"tC\"><div class=\"tT\"><\/div><\/div><div class=\"play\"><\/div><div class=\"ctrl\"><div class=\"Lctrl\"><\/div><div class=\"Rctrl\"><\/div><\/div><\/div><noscript><a href=\"https:\/\/youtu.be\/UHnVIxOfTOg\" rel=\"nofollow\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.hiig.de\/wp-content\/plugins\/wp-youtube-lyte\/lyteCache.php?origThumbUrl=https%3A%2F%2Fi.ytimg.com%2Fvi%2FUHnVIxOfTOg%2F0.jpg\" alt=\"YouTube video thumbnail\" width=\"420\" height=\"216\" \/><br \/>Watch this video on YouTube<\/a><\/noscript><\/div><\/div><div class=\"lL\" style=\"max-width:100%;width:420px;margin:5px auto;\"><\/div>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>References<\/strong><\/h3>\n\n\n\n<p>Check Point (2020) <em>Coronavirus update: In the cyber world, the graph has yet to flatten<\/em> Check Point Blog.&nbsp; Retrieved from: <a href=\"https:\/\/blog.checkpoint.com\/2020\/04\/02\/coronavirus-update-in-the-cyber-world-the-graph-has-yet-to-flatten\/\">https:\/\/blog.checkpoint.com\/2020\/04\/02\/coronavirus-update-in-the-cyber-world-the-graph-has-yet-to-flatten\/<\/a><\/p>\n\n\n\n<p>DiploFoundation (2020, March 24). <em>[Live Discussion] Could COVID 19 disrupt the Internet? <\/em>[Video File] Retrieved from <a href=\"https:\/\/youtu.be\/7-id-mWlymA\">https:\/\/youtu.be\/7-id-mWlymA<\/a>&nbsp;<\/p>\n\n\n\n<p>Mason, James; Stupp, Catherine; Hinshaw, Drew. (2020, April 3) U.S. and Europe Turn to Phone-Tracking Strategies to Slow Spread of Coronavirus. <em>The Wall Street Journal [online].<\/em> Retrieved from: <a href=\"https:\/\/www.wsj.com\/articles\/u-s-and-europe-turn-to-phone-tracking-strategies-to-halt-spread-of-coronavirus-11585906203\">https:\/\/www.wsj.com\/articles\/u-s-and-europe-turn-to-phone-tracking-strategies-to-halt-spread-of-coronavirus-11585906203<\/a>&nbsp;<\/p>\n\n\n\n<p>National Cyber Security Center (NCSS); Cybersecurity and Infrastructure Security Agency (CISA). (2020, April 8) <em>Advisory: COVID-19 exploited by malicious cyber actors<\/em>. Retrieved from: <a href=\"https:\/\/www.ncsc.gov.uk\/news\/covid-19-exploited-by-cyber-actors-advisory\">https:\/\/www.ncsc.gov.uk\/news\/covid-19-exploited-by-cyber-actors-advisory<\/a>&nbsp;<\/p>\n\n\n\n<p>Romm, Tony (2020, February 29) Millions of tweets peddled conspiracy theories about coronavirus in other countries, an unpublished U.S. report says. <em>The Washington Post<\/em> [online]. Retrieved from: <a href=\"https:\/\/www.washingtonpost.com\/technology\/2020\/02\/29\/twitter-coronavirus-misinformation-state-department\/\">https:\/\/www.washingtonpost.com\/technology\/2020\/02\/29\/twitter-coronavirus-misinformation-state-department\/<\/a>&nbsp;<\/p>\n\n\n\n<p>Thales (2020, March 24) <em>COVID-19 Cyber Threat Assessment<\/em>:&nbsp; Retrieved from: <a href=\"https:\/\/www.thalesgroup.com\/sites\/default\/files\/database\/document\/2020-03\/2020-03-24_COVID-19_CYBER_THREAT_ASSESSMENT_(ENG).pdf?_ga=2.5586352.201679710.1586936406-183827954.1586936406\">https:\/\/www.thalesgroup.com\/sites\/default\/files\/database\/document\/2020-03\/2020-03-24_COVID-19_CYBER_THREAT_ASSESSMENT_(ENG).pdf?_ga=2.5586352.201679710.1586936406-183827954.1586936406<\/a><\/p>\n<div class=\"shariff shariff-align-flex-start shariff-widget-align-flex-start\"><ul class=\"shariff-buttons theme-round orientation-horizontal buttonsize-medium\"><li class=\"shariff-button linkedin shariff-nocustomcolor\" style=\"background-color:#1488bf\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fwww.hiig.de%2Fen%2Fthe-coronavirus-pandemic-and-its-impact-on-cybersecurity%2F\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0077b5; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 27 32\"><path fill=\"#0077b5\" d=\"M6.2 11.2v17.7h-5.9v-17.7h5.9zM6.6 5.7q0 1.3-0.9 2.2t-2.4 0.9h0q-1.5 0-2.4-0.9t-0.9-2.2 0.9-2.2 2.4-0.9 2.4 0.9 0.9 2.2zM27.4 18.7v10.1h-5.9v-9.5q0-1.9-0.7-2.9t-2.3-1.1q-1.1 0-1.9 0.6t-1.2 1.5q-0.2 0.5-0.2 1.4v9.9h-5.9q0-7.1 0-11.6t0-5.3l0-0.9h5.9v2.6h0q0.4-0.6 0.7-1t1-0.9 1.6-0.8 2-0.3q3 0 4.9 2t1.9 6z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button bluesky shariff-nocustomcolor\" style=\"background-color:#84c4ff\"><a href=\"https:\/\/bsky.app\/intent\/compose?text=The%20coronavirus%20pandemic%20and%20its%20impact%20on%20cybersecurity https%3A%2F%2Fwww.hiig.de%2Fen%2Fthe-coronavirus-pandemic-and-its-impact-on-cybersecurity%2F  via @hiigberlin.bsky.social\" title=\"Share on Bluesky\" aria-label=\"Share on Bluesky\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0085ff; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"20\" height=\"20\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 20 20\"><path class=\"st0\" d=\"M4.89,3.12c2.07,1.55,4.3,4.71,5.11,6.4.82-1.69,3.04-4.84,5.11-6.4,1.49-1.12,3.91-1.99,3.91.77,0,.55-.32,4.63-.5,5.3-.64,2.3-2.99,2.89-5.08,2.54,3.65.62,4.58,2.68,2.57,4.74-3.81,3.91-5.48-.98-5.9-2.23-.08-.23-.11-.34-.12-.25,0-.09-.04.02-.12.25-.43,1.25-2.09,6.14-5.9,2.23-2.01-2.06-1.08-4.12,2.57-4.74-2.09.36-4.44-.23-5.08-2.54-.19-.66-.5-4.74-.5-5.3,0-2.76,2.42-1.89,3.91-.77h0Z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button mailto shariff-nocustomcolor\" style=\"background-color:#a8a8a8\"><a href=\"mailto:?body=https%3A%2F%2Fwww.hiig.de%2Fen%2Fthe-coronavirus-pandemic-and-its-impact-on-cybersecurity%2F&subject=The%20coronavirus%20pandemic%20and%20its%20impact%20on%20cybersecurity\" title=\"Send by email\" aria-label=\"Send by email\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#999; color:#fff\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#999\" d=\"M32 12.7v14.2q0 1.2-0.8 2t-2 0.9h-26.3q-1.2 0-2-0.9t-0.8-2v-14.2q0.8 0.9 1.8 1.6 6.5 4.4 8.9 6.1 1 0.8 1.6 1.2t1.7 0.9 2 0.4h0.1q0.9 0 2-0.4t1.7-0.9 1.6-1.2q3-2.2 8.9-6.1 1-0.7 1.8-1.6zM32 7.4q0 1.4-0.9 2.7t-2.2 2.2q-6.7 4.7-8.4 5.8-0.2 0.1-0.7 0.5t-1 0.7-0.9 0.6-1.1 0.5-0.9 0.2h-0.1q-0.4 0-0.9-0.2t-1.1-0.5-0.9-0.6-1-0.7-0.7-0.5q-1.6-1.1-4.7-3.2t-3.6-2.6q-1.1-0.7-2.1-2t-1-2.5q0-1.4 0.7-2.3t2.1-0.9h26.3q1.2 0 2 0.8t0.9 2z\"\/><\/svg><\/span><\/a><\/li><\/ul><\/div>","protected":false},"excerpt":{"rendered":"<p>The coronavirus pandemic has impacted cybersecurity in several ways. The challenges range from the infrastructure of the internet itself to the spread of disinformation online. Nevertheless, not all is lost, as, at the same time, valuable lessons can be learned for the future. The coronavirus pandemic has changed society\u2019s way of life in several ways,&hellip;<\/p>\n","protected":false},"author":316,"featured_media":67820,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1579,224],"tags":[1098,1045,1049,1111],"class_list":["post-67828","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ftif-plattformen-governance","category-policy-and-law","tag-corona-2","tag-datenschutz-2","tag-privatsphare","tag-uberwachung"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The coronavirus pandemic and its impact on cybersecurity &#8211; Digital Society Blog<\/title>\n<meta name=\"description\" content=\"The coronavirus has impacted cybersecurity in several ways. The challenges range from the infrastructure of the internet itself to disinformation online. Nevertheless, not all is lost, as, valuable lessons can be learned for the future.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hiig.de\/en\/the-coronavirus-pandemic-and-its-impact-on-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The coronavirus pandemic and its impact on cybersecurity &#8211; Digital Society Blog\" \/>\n<meta property=\"og:description\" content=\"The coronavirus has impacted cybersecurity in several ways. The challenges range from the infrastructure of the internet itself to disinformation online. Nevertheless, not all is lost, as, valuable lessons can be learned for the future.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hiig.de\/en\/the-coronavirus-pandemic-and-its-impact-on-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"HIIG\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-04T09:30:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-28T15:06:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/04\/franck-v-uWaRsN-CqY0-unsplash.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bruna Toso de Alc\u00e2ntara\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bruna Toso de Alc\u00e2ntara\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The coronavirus pandemic and its impact on cybersecurity &#8211; Digital Society Blog","description":"The coronavirus has impacted cybersecurity in several ways. The challenges range from the infrastructure of the internet itself to disinformation online. Nevertheless, not all is lost, as, valuable lessons can be learned for the future.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hiig.de\/en\/the-coronavirus-pandemic-and-its-impact-on-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"The coronavirus pandemic and its impact on cybersecurity &#8211; Digital Society Blog","og_description":"The coronavirus has impacted cybersecurity in several ways. The challenges range from the infrastructure of the internet itself to disinformation online. Nevertheless, not all is lost, as, valuable lessons can be learned for the future.","og_url":"https:\/\/www.hiig.de\/en\/the-coronavirus-pandemic-and-its-impact-on-cybersecurity\/","og_site_name":"HIIG","article_published_time":"2020-05-04T09:30:58+00:00","article_modified_time":"2023-03-28T15:06:15+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/04\/franck-v-uWaRsN-CqY0-unsplash.jpg","type":"image\/jpeg"}],"author":"Bruna Toso de Alc\u00e2ntara","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bruna Toso de Alc\u00e2ntara","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hiig.de\/en\/the-coronavirus-pandemic-and-its-impact-on-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.hiig.de\/en\/the-coronavirus-pandemic-and-its-impact-on-cybersecurity\/"},"author":{"name":"Bruna Toso de Alc\u00e2ntara","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/ca76c0a9a31b8635179d4f0cd642afd0"},"headline":"The coronavirus pandemic and its impact on cybersecurity","datePublished":"2020-05-04T09:30:58+00:00","dateModified":"2023-03-28T15:06:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hiig.de\/en\/the-coronavirus-pandemic-and-its-impact-on-cybersecurity\/"},"wordCount":1013,"publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"image":{"@id":"https:\/\/www.hiig.de\/en\/the-coronavirus-pandemic-and-its-impact-on-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/04\/franck-v-uWaRsN-CqY0-unsplash.jpg","keywords":["corona","datenschutz","privatsph\u00e4re","\u00fcberwachung"],"articleSection":["Ftif Platform governance","Policy and Law"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.hiig.de\/en\/the-coronavirus-pandemic-and-its-impact-on-cybersecurity\/","url":"https:\/\/www.hiig.de\/en\/the-coronavirus-pandemic-and-its-impact-on-cybersecurity\/","name":"The coronavirus pandemic and its impact on cybersecurity &#8211; Digital Society Blog","isPartOf":{"@id":"https:\/\/www.hiig.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hiig.de\/en\/the-coronavirus-pandemic-and-its-impact-on-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.hiig.de\/en\/the-coronavirus-pandemic-and-its-impact-on-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/04\/franck-v-uWaRsN-CqY0-unsplash.jpg","datePublished":"2020-05-04T09:30:58+00:00","dateModified":"2023-03-28T15:06:15+00:00","description":"The coronavirus has impacted cybersecurity in several ways. The challenges range from the infrastructure of the internet itself to disinformation online. Nevertheless, not all is lost, as, valuable lessons can be learned for the future.","breadcrumb":{"@id":"https:\/\/www.hiig.de\/en\/the-coronavirus-pandemic-and-its-impact-on-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hiig.de\/en\/the-coronavirus-pandemic-and-its-impact-on-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/en\/the-coronavirus-pandemic-and-its-impact-on-cybersecurity\/#primaryimage","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/04\/franck-v-uWaRsN-CqY0-unsplash.jpg","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2020\/04\/franck-v-uWaRsN-CqY0-unsplash.jpg","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/www.hiig.de\/en\/the-coronavirus-pandemic-and-its-impact-on-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hiig.de\/en\/"},{"@type":"ListItem","position":2,"name":"The coronavirus pandemic and its impact on cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.hiig.de\/#website","url":"https:\/\/www.hiig.de\/","name":"HIIG","description":"Alexander von Humboldt Institute for Internet and Society","publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hiig.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hiig.de\/#organization","name":"HIIG","url":"https:\/\/www.hiig.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","width":320,"height":80,"caption":"HIIG"},"image":{"@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/ca76c0a9a31b8635179d4f0cd642afd0","name":"Bruna Toso de Alc\u00e2ntara"}]}},"_links":{"self":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/67828","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/users\/316"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/comments?post=67828"}],"version-history":[{"count":8,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/67828\/revisions"}],"predecessor-version":[{"id":74205,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/67828\/revisions\/74205"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media\/67820"}],"wp:attachment":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media?parent=67828"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/categories?post=67828"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/tags?post=67828"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}