facebook linkedin twitter

Computerware Blog

COVID-19 is Having a Big Effect on Cybersecurity

COVID-19 is Having a Big Effect on Cybersecurity

The COVID-19 pandemic has put a lot of stress on people.  Nowhere is this more true than in the small business arena. Small businesses, many of which were forced to suspend or severely alter their operations, are also dealing with cyberattacks. Let’s take a look at the effects COVID-19 has on small businesses regarding cybersecurity. 

It Was Bad Before, Now It’s Worse

Before this whole COVID-19 mess, there were a lot of different threats that businesses had to take into consideration. Now with the fear surrounding the pandemic, scammers have a lot of new ammunition to use to try to steal access and data. The problem is that with everyone distracted, people are being less vigilant and it’s creating more victims. Threats include:

  • Phishing attacks 
  • Distributed denial of service attacks
  • Man-in-the-Middle attacks
  • Network based user threats due to negligence or sabotage

Any of these can work to undermine your business’ network security and cause major problems from operational disruption, a loss of reputation, data theft, and even the unthinkable: a ransomware situation.

Any of these threats can undermine your business. Here are two of the direct problems businesses have been seeing during the COVID-19 pandemic:

Website Spoofing

It’s a shame that business owners and decision makers are forced to deal with these kinds of problems when their attention should be on sustaining their business’ operations. Scammers don’t care that this situation is stressful enough. They have been setting up websites that spoof legitimate ones and people have fallen for them. They have set up sites spoofing government websites, businesses, banks, and more. Here are a couple things you should keep in mind to not fall victim to these sites.

  • Check the URL - While a fake site may look just like the real thing, the URL will not. You need to move deliberately online when sensitive personal, medical, or financial information is at stake. Simply running your mouse over any links or buttons can expose spoofed websites and keep you from being a victim. 
  • Use Ad Blockers - As simple as any solution there is, is to use ad blockers. These browser extensions can go a long way toward keeping you off spoofed websites and on the legitimate path.

Email and Text Phishing

If you are a regular reader of our blog, we discuss phishing all the time. It is currently the number one threat to people online, and therefore, the biggest threat to businesses, too. Phishing tactics are known to adjust, and during the COVID-19 pandemic they’ve done just that, attempting to use the pandemic as a way to gain access to computing networks. With over three billion phishing emails sent every day, it is essential for any decision maker to make phishing training (and testing) a priority for your organization. It will pay huge dividends if that knowledge can keep your business from dealing with the litany of problems that come from being successfully phished. Here are two things you need to drill your team on:

  • Confirm the Sender - The only way a phishing attempt is successful is when the person receiving the message interacts with it. Your staff needs to know that an email has come from a legitimate source before they interact with it, period. 
  • Don’t Click on Links and Attachments - Phishing emails and messages require the user to take action. If there are links or attachments sent in an email, users have to know they are interacting with a reliable email before clicking on anything. It’s so important to not click on links or open attachments when you don’t already know where the message comes from.

Unfortunately, cybercrime will be here a whole lot longer than COVID-19. That’s why it is essential that your staff is trained and understands the risks of allowing unauthorized entities onto your network. If you need help putting together a cybersecurity strategy, or you would like to talk to one of our knowledgeable technicians, call Computerware today at (703) 821-8200.

Taking Data Security Seriously
Unified Communication Brings Big Benefits
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, July 10, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Cloud Software Hackers Data Business Management Hardware Microsoft Workplace Tips Network Security Backup Hosted Solutions Managed Service Provider Productivity Business Productivity Email Malware IT Services Saving Money Efficiency Google Computer User Tips Small Business Innovation Collaboration VoIP IT Support Smartphones Quick Tips Data Backup IT Support communications Mobile Devices Network Business Continuity Microsoft Office Gadgets Android Social Media Disaster Recovery Data Recovery Cybersecurity Upgrade Communication Mobile Office Server Smartphone Phishing Virtualization Mobile Device Management Miscellaneous Vendor Management Ransomware Holiday Managed IT Services Windows 10 Operating System Passwords Apps Outsourced IT Windows Tech Term Remote Monitoring Unified Threat Management Internet of Things Mobile Device Facebook Users BDR Automation Managed IT services Mobile Computing BYOD Remote Computing Data Management Apple Analytics WiFi Windows 10 Artificial Intelligence Cloud Computing History The Internet of Things Training Marketing Save Money Firewall Browser Encryption Big data Spam App Business Technology Help Desk Alert Health IT Consultant Office 365 Information Technology Two-factor Authentication Bandwidth Office Antivirus Budget Content Filtering Hard Drives Going Green Access Control Gmail Government Windows 7 Maintenance Managed IT Cybercrime Bring Your Own Device Printer Virus Wireless Technology Tech Support Retail Search Managed Service Cost Management Hiring/Firing Best Practice Information Lithium-ion Battery Outlook Windows 8 Saving Time Healthcare Computers VPN Recovery Employer-Employee Relationship Blockchain Update Data Loss Remote Work Hacking Networking Phone System Project Management iPhone Money Document Management Computing Customer Service IBM Augmented Reality It Management Data Security Travel Humor Education Applications Patch Management Flexibility Mobility Administration Password Risk Management Value Conferencing Legal Data Breach Hacker Save Time Vendor Covid-19 Avoiding Downtime Current Events Regulations Downtime SaaS Proactive IT Computer Repair Running Cable Wireless Law Enforcement Customer Relationship Management Voice over Internet Protocol Storage Website File Sharing Intranet Hard Drive PowerPoint Compliance Twitter Solid State Drive Data storage Black Market Word Social Engineering Cryptocurrency Cortana Laptop Scam Business Growth Net Neutrality Business Intelligence Meetings Cooperation Private Cloud Digital Payment Wi-Fi Monitoring Digital Router Paperless Office Websites Telephony Machine Learning Sports Comparison Tablet User Disaster Virtual Desktop Telephone Systems Management Company Culture Hosted Solution Software as a Service Social Excel End of Support Robot Social Networking Fax Server Vulnerabilities DDoS Securty Google Maps Text Messaging Virtual Reality Webcam Downloads Streaming Media Politics eWaste Automobile Distribution Emails How To Employee/Employer Relationship Google Docs Chromebook Managed Services Memory Experience Redundancy Computing Infrastructure Hack Managed IT Service Cleaning Chrome How To Cost Monitors Processors Inbound Marketing Office Tips Download Evernote Virtual Assistant USB Processor Computer Accessories Co-managed IT YouTube Presentation User Error Start Menu Tech Terms Microchip Taxes Pain Points Unified Communications Settings Safety Solutions Multi-factor Authentication Trending Distributed Denial of Service Mobile Technology Specifications Mouse Telephone Professional Services Documents Public Cloud Licensing Uninterrupted Power Supply Smart Devices Lifestyle Entertainment Integration Vulnerability Statistics Teamwork Heating/Cooling IT service Programming Bitcoin Identity Theft Network Congestion Data Protection Gaming Console Managed Services Provider Bluetooth Recording GPS Internet Service Provider Optimization Gamification Recycling In Internet of Things Directions Display Screen Reader Customer Resource management WannaCry Analytic Domains Work/Life Balance Time Management Freedom of Information Dark Web External Harddrive Free Resource Regulations Compliance Smart Tech Deep Learning Corporate Profile Product Reviews Public Speaking SSID IT Assessment Get More Done Piracy Upload Scalability Health IT Remote Working Printer Server HTML Shortcut Motion Sickness Processing Turn Key Fiber-Optic Database Visible Light Communication Assessment SharePoint Read Tracking Logistics 3D Virtual Machines Ebay Trojan Mobile Security Tip of the week Entrepreneur Wasting Time Thin CLient IT consulting Telephone System Google Calendar Troubleshooting Messenger Software License Trends Touchscreen Device Management News Environment Bookmark Smart Phones Financial Data Organize Multi-Factor Security VoIP HIPAA Rental Service Electronic Health Records Cyber security Content Management Electronic Payment Cabling Employer/Employee Relationships Devices CIO Knowledge Business Managemenet Competition Web Server Google Play Memes Telephone Service Fraud Tactics Advertising Flash Consultation Books Workers Microsoft 365 Adminstration Managing IT Services Pirating Information UTM Staffing Content Google Wallet Administrator Managing Costs Leadership Windows XP Technology Tips Business Owner IT Plan Enterprise Resource Planning Society Fake News online Currency Browsers Telework Legislation Error Displays Audit IP Address Supercomputer Medical IT Surveillance Trend Micro Data Warehousing Human Resources Worker User Tip Proactive Maintenance Remote Workers Webinar Accountants A.I. Micrsooft Application Security Cameras IT Threats email scam Addiction Reading Samsung Virtual Private Network Drones Emergency Hard Drive Disposal LinkedIn Navigation Virtual Machine Access Migration Connected Devices Microsoft Excel G Suite Data Analysis Employees FinTech Wireless Headphones Computer Care Employer Employee Relationship Development eCommerce Google Drive Windows Server 2008 Archive SQL Server Data Storage Equifax Fleet Tracking Skype Digital Signature Hacks Physical Security GDPR Upselling Managing Risk Network Management Permissions Language Relocation Tablets Procurement Video Surveillance Device security MSP Banking Botnet Tech Hypervisor Spyware Mobile Payment Video Conferencing Holidays Best Practives Desktop Finance Music Sync Fileless Malware Hybrid Cloud Saving ZTime Nanotechnology switches Social Network Writing Electricity Printing Point of Contact PDF Proxy Server Azure PCI DSS Startup Asset Tracking Upgrades Notifications CCTV Modem Communitications Strategy Business Cards Service Level Agreement Reliable Computing Electronic Medical Records Transportation Supply Chain Management Debate Username Best Available Keyboard Business Metrics Computer Malfunction Term Harddrive Microserver Unified Threat Management Backup and Disaster Recovery LiFi cache Television Managing Stress 3D Printing CrashOverride Personal Information Regulation Financial Capital Productuvuty Printers

toner1