Security budget battles in the age of COVID-19

What systems are in place to defend against unauthorized use (i.e. by potential cybercriminals) attempting to breach sensitive information?