{"id":8703,"date":"2020-02-20T09:11:31","date_gmt":"2020-02-20T14:11:31","guid":{"rendered":"https:\/\/www.cscdigitalbrand.services\/blog\/?p=8703"},"modified":"2026-01-19T09:28:54","modified_gmt":"2026-01-19T14:28:54","slug":"five-security-blind-spots-from-prolonged-implementation-of-a-business-continuity-plan","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/five-security-blind-spots-from-prolonged-implementation-of-a-business-continuity-plan\/","title":{"rendered":"Five Security Blind Spots from Prolonged Implementation of a Business Continuity Plan"},"content":{"rendered":"\n<p>The novel coronavirus outbreak (COVID-19) has prompted many organizations in Mainland China and Hong Kong to execute their business continuity plan (BCP). During the last epidemic in 2003, the SARS outbreak lasted for nine months\u2014and with an infection rate that is increasing rapidly, this new coronavirus has the potential to cause prolonged periods of commercial disruption, and heavy reliance on BCPs.<\/p>\n\n\n\n<p>The most common practice in a BCP is to give employees the ability to work from home through VPN for secure, remote access. Although VPN is already commonly used in the business world, this medical epidemic has created a sudden surge in massive and prolonged use in affected regions, which may expose organizations to unforeseen risks. This article details a few security blind spots that may arise.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. VPN hijacking<\/strong><\/h3>\n\n\n\n<p>In December 2019, a new vulnerability\non VPN\u2014CVE-2019-14899\u2014was discovered.<sup>1<\/sup>\nAmazon \u00ae engineer, Colm MacC\u00e1rthaigh, described it as \u201cextremely clever\u201d and\n\u201cvery impressive.\u201d This attack works across many different VPNs and&nbsp;&#8220;the\nVPN technology used does not seem to matter.\u201d<sup>2<\/sup>\nIt appeared to be a variation of the TCP sequence prediction&nbsp;attack, where\nthe attacker observes to determine the TCP sequence to insert a malicious data packet\nand effectively hijack the VPN tunnel. <\/p>\n\n\n\n<p>This type of attack could be very\neffective in targeted hijacking campaigns, and it works across any device and\nVPN. Unsuspecting employees accessing VPN through an unsecured home Wi-Fi\nnetwork become susceptible.<\/p>\n\n\n\n<p>MacC\u00e1rthaigh, who develops Amazon Web Service\u2019s VPN products, warned that the attack can pose an even more serious threat <a href=\"https:\/\/www.openwall.com\/lists\/oss-security\/2019\/12\/05\/3\" target=\"_blank\" rel=\"noreferrer noopener\">if combined with domain name system (DNS) spoofing.<\/a><sup>3<\/sup> It\u2019s easy for attackers to profile DNS requests and reply based on the size and position of the data packets; DNS is often the first traffic in a sequence, and a DNS query is made before VPN is established. As a result, \u201chijacking traffic via DNS is usually much more powerful than payload injection,\u201d<sup>4<\/sup> and can be used as a part of the VPN hijacking attack. A variation of this attack can also be used to steal VPN passwords, giving attackers free access to the corporate network.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. Stealing VPN passwords through DNS hijacking<\/strong><\/h3>\n\n\n\n<p>During the renowned DNS hijacking campaign by the Sea Turtle hackers in 2019, Cisco Talos reported that the perpetrators were able to steal email and other login credentials, and redirect all email and VPN traffic to fake servers controlled by the attackers. The attackers hijacked either the domain name registrar or the DNS service provider to gain access to business-critical domains of the victim organizations. Once a domain name is hijacked, the attacker can obtain the secure sockets layer (SSL) or transport layer security (TLS) digital   certificate for the targeted domain (e.g., vpn.victimcompany.com), which allows them to \u201cdecrypt the intercepted email and VPN credentials and view them in plain text.\u201d<sup>5<\/sup><\/p>\n\n\n\n<p>Other hackers have replicated the Sea Turtle attack, as evidenced by the increased number of DNS hijacks, and high-profile registrars hacked since. This trend is likely to continue, as it\u2019s far more cost effective to hijack DNS then attack anything within a well-protected firewall. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. Domain name and DNS security could affect VPN<\/strong><\/h3>\n\n\n\n<p>VPNs can be set up either by using an IP address directly, or through your DNS. The benefit of using DNS is the flexibility it offers; hence, this is a popular option. With this, the domain name and DNS hijacking issues discussed above create another dimension of risk. To mitigate these risks, companies should review both the security of both their registrar and DNS.<\/p>\n\n\n\n<p><strong>I. Registrar security<\/strong> \u2013 Attackers can gain control over the nameserver record hosted with your domain name registrar, which links a domain to your DNS, if your account at your registrar is compromised. This allows them to redirect your core domains to any DNS, enabling all types of man-in-the-middle attacks. A registrar breach happens <strong>completely outside your firewall<\/strong> and must be mitigated through proper third-party risk management. An effective risk mitigation strategy includes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Using enterprise-class providers. Avoid low-cost, low-security providers with a security breach history.<\/li>\n\n\n\n<li>Ensuring your registrar provides registry lock services and has DNS security extensions (DNSSEC)enabled.<\/li>\n\n\n\n<li>Ensuring your registrar login portal has proper two-factor authentication (2FA) implemented. If possible, avoid SMS-based 2FA.<\/li>\n\n\n\n<li>Locking your vital domains at the registry(not to be <a href=\"https:\/\/www.cscdbs.com\/blog\/confused-about-domain-locks\/\">confused with registrar lock<\/a>).<\/li>\n<\/ul>\n\n\n\n<p>It\u2019s important to note that the domain behind your VPN connection might be different from your core domain. Domain names used internally could be neglected and may not be considered vital, needing attention and security controls. These domains could be considered to be of low importance, or were set up by an ex-employee or contractor, and your current network engineer may no longer have full visibility. We highly recommend that you conduct an internal audit to account for any domain used for internal critical systems, especially business continuity-related services, and to ensure proper security controls. If such domains are hacked, your BCP will fail.<\/p>\n\n\n\n<p><strong>II. DNS security and availability<\/strong> \u2013 The attacker can also hijack the DNS server directly. As long as your VPN connection uses the DNS, either a registrar or DNS hijack could completely shut down your BCP. Here are some best practices to mitigate DNS hijacking:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use enterprise-class services. Avoid low-cost, low-security DNS services, especially free DNS.<\/li>\n\n\n\n<li>Ensure your DNS login portal has proper two-factor authentication implemented, avoiding SMS-based 2FA.<\/li>\n\n\n\n<li>Ensure your DNS service provider has 24\/7 support and is able to make corrections through the system. If the service requires you to log a ticket and manually update your zone, the risk during an emergency is too high.<\/li>\n\n\n\n<li>Monitor DNS zone file changes. While registry-registrar locks prevent unauthorized changes to your domain nameserver records in the WHOIS in a DNS hijack, it does not lock the zone. Partner with a provider who can offers monitoring or integrate monitoring with your SIEM.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4. SSL VPN and digital certificate management risks<\/strong><\/h3>\n\n\n\n<p>VPN can either be encrypted through IPSec or SSL. Due\nto easier implementation, low cost, and higher scalability, SSL VPN is becoming\nmore popular. With a lack of licenses, and the difficulty in implementing IPSec\nVPN systems when there is a sudden need to scale up access during a BCP\nsituation, companies may have implemented SSL VPN for their remote employees. <\/p>\n\n\n\n<p>If this is the case, it\u2019s essential to consider the risks related to digital certificate management, which often arise from bad habits. Unfortunately, mismanagement happens rather regularly, even to large organizations, like LinkedIn\u00ae, causing significant loss to businesses.<\/p>\n\n\n\n<p>If your organization has implemented SSL VPN in your BCP process, it\u2019s critical to review your policy to ensure the certificate will not expire. Some best practices are:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>If your organization has a significant number of<br \/>digital certificates, consider a digital certificate management service that<br \/>can enable automatic renewal and installation for both your internal and<br \/>external certificates.<\/li>\n\n\n\n<li>If automatic renewal is not preferred, there<br \/>will always be a chance that a digital certificate will expire unnoticed; as Murphy\u2019s<br \/>Law states, whatever can go wrong, will go wrong. Your vendor\u2019s ability to respond<br \/>quickly during an incident becomes critical. They should have 24\/7 support and<br \/>preferably not be online only or accessible only through web forms.<\/li>\n\n\n\n<li>Implement Certification<br \/>Authority\u00a0Authorization (CAA) record, which helps create a governance<br \/>framework for your digital certificates. It helps prevents rogue SSL issuance<br \/>on your domain, as well as prevent employees from purchasing from unauthorized<br \/>vendors.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>5. Phishing attacks during emergencies <\/strong><\/h3>\n\n\n\n<p>It\u2019s an unfortunate fact that in any emergency, there will be cyber criminals waiting to capitalize on the situation. \u201cAs people grow concerned about the Wuhan coronavirus \u2026 cyber criminals are preying on their fear, with phishing emails claiming to have advice on protective safety measures. Emails have been seen in the U.S. and U.K.\u201d<sup>6<\/sup><\/p>\n\n\n\n<p>To date, CSC has detected 63 domain\nregistrations containing the word \u201ccorona\u201d ranging from informative sites, eCommerce\nsite selling masks, to information site with subtle recommendations to buy\ncertain branded medicine. If your company is related to medical supplies or\npharmaceuticals, be aware that counterfeiters could be using phishing campaigns\nto promote counterfeit products, no matter whether your product actually has anything\nto do with corona virus.<\/p>\n\n\n\n<p>Phishers, on the other hand, are\nunlikely to use the name of the virus in the email or the domain name; it would\nbe too easy for anti-virus software to detect it. Instead, they use the brand\nas a hook for the victim to view a report on a macro-enabled Word document or\nan infected .PDF, hence infecting their machine. Companies need to be aware of the\npotential use of their brand as a means to phish, because in such cases,\nclients will be the victims and the brand will be damaged. <\/p>\n\n\n\n<p>Phishing attacks can target your\ncompany internally through spear-phishing, whaling, or business email compromise\n(BEC) of your executives and employees, or externally, targeting your clients\nby using your brand name in a domain or brand spoofing phishing campaign. These\nattacks should be on the radar of the Information Security team.<\/p>\n\n\n\n<p>For internally-focused phishing, it is\nrecommended that domain message authentication, reporting, and conformance (DMARC)\nprotocol is implemented to control the email rejection policy set up by your sender\npolicy framework record. You should ensure your email gateway supports DMARC, to\neffectively filter spoofed emails pretending to be your employees or partners. <\/p>\n\n\n\n<p>For externally-focused phishing, we recommend\nimplementing an anti-fraud monitoring service. It is the only way to protect\nclients who may not have sophisticated firewalls and email gateways to protect\nthem. <\/p>\n\n\n\n<p>A BCP is\nused to ensure business as usual during a crisis, however if the systems that\nit uses, such as VPN, as well as DNS, domains, and digital certificates that\nsit outside the firewall are at risk, the BCP itself could expose organizations\nto vulnerabilities. Being mindful of these security blind spots can mitigate\nbusiness continuity risks by ensuring the right security controls and policies\nare place.<br \/><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\" \/>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"https:\/\/seclists.org\/oss-sec\/2019\/q4\/122\">seclists.org\/oss-sec\/2019\/q4\/122<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.zdnet.com\/article\/new-vulnerability-lets-attackers-sniff-or-hijack-vpn-connections\/\">zdnet.com\/article\/new-vulnerability-lets-attackers-sniff-or-hijack-vpn-connections\/<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.openwall.com\/lists\/oss-security\/2019\/12\/05\/3\">openwall.com\/lists\/oss-security\/2019\/12\/05\/3<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.openwall.com\/lists\/oss-security\/2019\/12\/05\/3\">openwall.com\/lists\/oss-security\/2019\/12\/05\/3<\/a><\/li>\n\n\n\n<li>csoonline.com\/article\/3500492\/widespread-dns-hijacking-attacks-steal-target-s-vpn-credentials.html and <a href=\"https:\/\/krebsonsecurity.com\/2019\/02\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks\/\">https:\/\/krebsonsecurity.com\/2019\/02\/a-deep-dive-on-the-recent-widespread-dns-hijacking-attacks\/<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.darkreading.com\/endpoint\/coronavirus-phishing-attack-infects-us-uk-inboxes\/d\/d-id\/1336946\">darkreading.com\/endpoint\/coronavirus-phishing-attack-infects-us-uk-inboxes\/d\/d-id\/1336946<\/a><\/li>\n<\/ol>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The novel coronavirus outbreak (COVID-19) has prompted many organizations in Mainland China and Hong Kong to execute their business continuity plan (BCP). During the last epidemic in 2003, the SARS outbreak lasted for nine months\u2014and with an infection rate that is increasing rapidly, this new coronavirus has the potential to cause prolonged periods of commercial [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9,171,521],"tags":[],"class_list":["post-8703","post","type-post","status-publish","format-standard","hentry","category-brands","category-cyber-security","category-send-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Five Security Blind Spots from Prolonged Implementation of a Business Continuity Plan | CSC<\/title>\n<meta name=\"description\" content=\"The novel coronavirus outbreak (COVID-19) has prompted many organizations in Mainland China and Hong Kong to execute their business continuity plan (BCP).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/five-security-blind-spots-from-prolonged-implementation-of-a-business-continuity-plan\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Five Security Blind Spots from Prolonged Implementation of a Business Continuity Plan | CSC\" \/>\n<meta property=\"og:description\" content=\"The novel coronavirus outbreak (COVID-19) has prompted many organizations in Mainland China and Hong Kong to execute their business continuity plan (BCP).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/five-security-blind-spots-from-prolonged-implementation-of-a-business-continuity-plan\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-20T14:11:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-19T14:28:54+00:00\" \/>\n<meta name=\"author\" content=\"Digital Brand Services Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Brand Services Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/five-security-blind-spots-from-prolonged-implementation-of-a-business-continuity-plan\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/five-security-blind-spots-from-prolonged-implementation-of-a-business-continuity-plan\\\/\"},\"author\":{\"name\":\"Digital Brand Services Marketing\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\"},\"headline\":\"Five Security Blind Spots from Prolonged Implementation of a Business Continuity Plan\",\"datePublished\":\"2020-02-20T14:11:31+00:00\",\"dateModified\":\"2026-01-19T14:28:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/five-security-blind-spots-from-prolonged-implementation-of-a-business-continuity-plan\\\/\"},\"wordCount\":1683,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"articleSection\":[\"Brand Protection\",\"Cyber security\",\"Send email\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/five-security-blind-spots-from-prolonged-implementation-of-a-business-continuity-plan\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/five-security-blind-spots-from-prolonged-implementation-of-a-business-continuity-plan\\\/\",\"name\":\"Five Security Blind Spots from Prolonged Implementation of a Business Continuity Plan | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"datePublished\":\"2020-02-20T14:11:31+00:00\",\"dateModified\":\"2026-01-19T14:28:54+00:00\",\"description\":\"The novel coronavirus outbreak (COVID-19) has prompted many organizations in Mainland China and Hong Kong to execute their business continuity plan (BCP).\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/five-security-blind-spots-from-prolonged-implementation-of-a-business-continuity-plan\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/five-security-blind-spots-from-prolonged-implementation-of-a-business-continuity-plan\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/five-security-blind-spots-from-prolonged-implementation-of-a-business-continuity-plan\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Five Security Blind Spots from Prolonged Implementation of a Business Continuity Plan\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\",\"name\":\"Digital Brand Services Marketing\",\"sameAs\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Five Security Blind Spots from Prolonged Implementation of a Business Continuity Plan | CSC","description":"The novel coronavirus outbreak (COVID-19) has prompted many organizations in Mainland China and Hong Kong to execute their business continuity plan (BCP).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/five-security-blind-spots-from-prolonged-implementation-of-a-business-continuity-plan\/","og_locale":"en_US","og_type":"article","og_title":"Five Security Blind Spots from Prolonged Implementation of a Business Continuity Plan | CSC","og_description":"The novel coronavirus outbreak (COVID-19) has prompted many organizations in Mainland China and Hong Kong to execute their business continuity plan (BCP).","og_url":"https:\/\/www.cscdbs.com\/blog\/five-security-blind-spots-from-prolonged-implementation-of-a-business-continuity-plan\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2020-02-20T14:11:31+00:00","article_modified_time":"2026-01-19T14:28:54+00:00","author":"Digital Brand Services Marketing","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Digital Brand Services Marketing","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/five-security-blind-spots-from-prolonged-implementation-of-a-business-continuity-plan\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/five-security-blind-spots-from-prolonged-implementation-of-a-business-continuity-plan\/"},"author":{"name":"Digital Brand Services Marketing","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d"},"headline":"Five Security Blind Spots from Prolonged Implementation of a Business Continuity Plan","datePublished":"2020-02-20T14:11:31+00:00","dateModified":"2026-01-19T14:28:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/five-security-blind-spots-from-prolonged-implementation-of-a-business-continuity-plan\/"},"wordCount":1683,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"articleSection":["Brand Protection","Cyber security","Send email"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/five-security-blind-spots-from-prolonged-implementation-of-a-business-continuity-plan\/","url":"https:\/\/www.cscdbs.com\/blog\/five-security-blind-spots-from-prolonged-implementation-of-a-business-continuity-plan\/","name":"Five Security Blind Spots from Prolonged Implementation of a Business Continuity Plan | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"datePublished":"2020-02-20T14:11:31+00:00","dateModified":"2026-01-19T14:28:54+00:00","description":"The novel coronavirus outbreak (COVID-19) has prompted many organizations in Mainland China and Hong Kong to execute their business continuity plan (BCP).","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/five-security-blind-spots-from-prolonged-implementation-of-a-business-continuity-plan\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/five-security-blind-spots-from-prolonged-implementation-of-a-business-continuity-plan\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/five-security-blind-spots-from-prolonged-implementation-of-a-business-continuity-plan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Five Security Blind Spots from Prolonged Implementation of a Business Continuity Plan"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d","name":"Digital Brand Services Marketing","sameAs":["https:\/\/www.cscdbs.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/8703","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=8703"}],"version-history":[{"count":8,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/8703\/revisions"}],"predecessor-version":[{"id":15021,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/8703\/revisions\/15021"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=8703"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=8703"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=8703"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}