But it's extremely well researched and written. Stephen McBride's article in Forbes combines an analyst's take with a well-thought-out narrative that hits close to my heart. 

The pandemic has NOT caused hackers to cease-fire; they are capitalizing on individuals' and organizations' fears and weaknesses, exploiting gaps in their security infrastructure as end-users have exploded beyond the boundaries of the traditional network, bypassing the North/South security and creating millions of potential vulnerable points to gain access and egress for ransomware, data theft, and other potential nefarious schemes. Non-persistent VPNs and BYO equipment with unknown states of integrity change the battlefield of preventing data breaches.

Now, granted, this article's ultimate goal is to promote investment in InfoSec companies and, full disclosure, I work for an InfoSec company, one that uses security segmentation to minimalize and mitigate the risk to your enterprise infrastructure. 

That said...

There are many ways to close those gaps right now. As passionate as I am about segmentation and the Zero Trust methodology to protect and prevent breaches at any time--and especially today--using the tools you have in your environment is the only way to even remotely ensure that your organization isn't the one in the news. 

Use your SIEM the way it's supposed to be, to aggregate the massive streams of data from your other tools and strip them down so that the most pressing data gets to you.

Use your ITSM to build workflows so everyone knows what they're supposed to be doing and all your bases are covered.

Most importantly, integrate security into your Resiliency plan and planning. BC/DR isn't just backup anymore. A ransomware attack could have been playing itself out in your environment for weeks or even months, well past your last viable recovery.

Thanks for your time. I appreciate comments, corrections, or questions!