WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home H2OSecCon 2026 The Ghosts of COVID-Past – Cybersecurity Considerations for Returning to Workspaces
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Community Partners
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

The Ghosts of COVID-Past – Cybersecurity Considerations for Returning to Workspaces

Author: Jennifer Walker

Created: Tuesday, May 4, 2021 - 18:12

Categories: Cybersecurity

In a heroic feat to maintain operations at a record-setting pace, countless IT and security teams rushed to provide accommodations for a new remote workforce leaving the office behind over one year ago. As we begin inhabiting those abandoned buildings there are bound to be some ghosts lurking around the office due to unintentional oversights when we left. If IT and security staff haven’t been on the premises during the past year, now is a good time to exorcise those ghosts before the masses return.

One of the most straightforward ghostly considerations would be computer patches and upgrades. Depending on your utility’s remote architecture and auto update status, unless users are connecting to their desktops remotely, there may be a lot of gremlins waiting to be patched/updated. Likewise, many organizations may find themselves in a “Catch-22” with a potential flood of those remote devices returning to the office. Hopefully those devices were managed remotely, but if not, there may be an expectation that people will use them in the office until their desktops are “updated.”

Another consideration for returning to work, particularly offices returning in waves, would be social engineering tactics that take advantage of the reduced occupancy. With reduced staff, there are fewer eyes noticing unauthorized persons. Fewer inhabitants makes it easier for miscreants to gain access to sensitive systems and information without people noticing. For example, gathering all the sticky note passwords (which we don’t recommend!) or other sensitive information left behind in the wake of the mass exodus without people asking questions. For additional considerations on the ghosts of cyber past haunting the office, visit DarkReading.

Related Resources

(TLP:CLEAR) Vulnerability Notification – Critical Zero-Day Vulnerability in Microsoft Exchange Under Active Exploitation, CVE-2026-42897

May 19, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Vulnerability Notification – Critical Vulnerability Affecting Cisco Catalyst SD-WAN, CVE-2026-20182

May 19, 2026 in Cybersecurity, Security Preparedness

Tip of the Week – May 14, 2026

May 14, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar