facebook linkedin twitter

Computerware Blog

Cyberattacks are Up at the World Health Organization

Cyberattacks are Up at the World Health Organization

The World Health Organization has been busy dealing with one of the biggest calamities in contemporary times, the COVID-19 pandemic that has had much of the world on pause for the past few months. Unfortunately, they’ve been dealing with an increase in cyberattacks. Today, we’ll take a look at some of the issues the WHO is having with cybercriminals. 

External Threats

With their position at the forefront of society during the pandemic the WHO has unfortunately attracted the less desirables of society, too. Cybercriminals are using the current COVID-19 pandemic, and the WHOs collection for their COVID-19 Solitary Response Fund, to steal information. Other scammers are currently attempting to steal money from people by extracting payment card information and login credentials from retailers and fintech companies. 

There’s also the matter of state-sponsored hacking, which is continuously trying to capitalize on opportunities presented by this emergency to infiltrate and spy on other nations. 

Internal Threats

Internally, the WHO has suffered a significant data breach recently. 450 active WHO email accounts and passwords were leaked by hackers. This is in addition to thousands of emails from people working deliberately on the Novel Coronavirus response. A WHO spokesman said that the attack only affected an old extranet system that staff, former employees, and outside partners use. They have since implemented considerably more secure authentication systems.

It stands to reason that the WHO has been targeted by hackers during this period as cybercriminals are opportunists by nature and COVID-19 is sadly looked upon as such an opportunity. 

If people who are at the forefront of a worldwide response to one of the deadliest viruses in modern history can be hacked, so can you. Call Computerware today at (703) 821-8200 to get the tools and knowledge your business needs to keep your network and infrastructure secure and your data safe.

Tip of the Week: 4 Important Network Management Ac...
Telework Is Turning Some Heads
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, September 28, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Software Cloud Data Business Management Hackers Hardware Microsoft Workplace Tips Network Security Productivity Backup Business Hosted Solutions Managed Service Provider Productivity Email Malware IT Services Efficiency Saving Money Google Innovation Small Business Computer User Tips Collaboration Data Backup VoIP Quick Tips IT Support IT Support Network Smartphones Mobile Devices communications Business Continuity Gadgets Data Recovery Disaster Recovery Microsoft Office Android Social Media Cybersecurity Smartphone Upgrade Mobile Office Communication Server Phishing Virtualization Miscellaneous Mobile Device Management Mobile Device Ransomware Windows Users Vendor Management Holiday Operating System Passwords Apps Windows 10 BDR Outsourced IT Tech Term Managed IT Services Remote Monitoring Facebook Internet of Things Unified Threat Management Automation BYOD Mobile Computing Data Management Analytics Remote Computing Managed IT services Apple Windows 10 WiFi Marketing The Internet of Things Training History Artificial Intelligence Browser Cloud Computing Firewall Business Technology Save Money Big data Spam Help Desk Health Alert App Encryption Information Technology Office 365 Budget Covid-19 Two-factor Authentication Bandwidth Office Managed Service IT Consultant Content Filtering Going Green Maintenance Hard Drives Printer Bring Your Own Device Access Control Antivirus VPN Gmail Windows 7 Managed IT Government Blockchain Cybercrime Best Practice Windows 8 Lithium-ion Battery Outlook Wi-Fi Cost Management Networking Information Hiring/Firing Healthcare Remote Work Tech Support Virus Wireless Technology Computers Saving Time Search Recovery Employer-Employee Relationship Retail Project Management Hacking IBM Money Augmented Reality Document Management Humor Computing Customer Service Data Security It Management Travel Education Phone System Data Loss Conferencing Update iPhone Data Breach Laptop Password Value Legal Save Time Downtime Hacker Customer Relationship Management Regulations PowerPoint Vendor Proactive IT SaaS Computer Repair Running Cable File Sharing Administration Hard Drive Wireless Law Enforcement Applications Intranet Twitter Solid State Drive Compliance Mobility Storage Website Patch Management Data storage Current Events Avoiding Downtime Flexibility Risk Management Voice over Internet Protocol Monitoring Net Neutrality Meetings Cortana Business Growth Chrome Business Intelligence Private Cloud Excel Digital Digital Payment Fax Server Router Management Telephony Websites Machine Learning Employee/Employer Relationship Paperless Office Vulnerabilities Telephone Systems Comparison Tablet Company Culture Sports Cooperation Software as a Service Disaster User Hosted Solution Virtual Desktop End of Support Social Networking Social Robot Securty DDoS Google Maps Social Engineering Scam Black Market Cryptocurrency Word How To eWaste Google Docs Pain Points Memory Experience Video Conferencing Download Managed Services Provider Evernote Virtual Assistant Cleaning Monitors Lifestyle Office Tips Multi-factor Authentication How To Processors Start Menu Tech Terms Computer Accessories Microchip Taxes Managed Services Telephone Distributed Denial of Service USB Managed IT Service Mobile Technology YouTube Settings Trending Presentation Gaming Console Unified Communications Public Cloud Licensing Uninterrupted Power Supply Mouse Vulnerability Text Messaging Processor Webcam Specifications Safety Programming Identity Theft Statistics Bitcoin Documents Data Protection Notifications IT service Network Congestion Entertainment Solutions Teamwork Heating/Cooling Distribution Virtual Reality Employees Downloads Politics Professional Services Automobile Inbound Marketing Emails Bluetooth Streaming Media Integration Co-managed IT Chromebook User Error Cost Smart Devices Computing Infrastructure Hack Redundancy Proxy Server Azure VoIP Procurement UTM Content Rental Service Modem Public Speaking Strategy Touchscreen News Visible Light Communication Electronic Medical Records Transportation Knowledge Device Management IT Plan Enterprise Resource Planning Web Server Term Shortcut Consultation IT consulting Organization Legislation Error Cabling Communitications email scam Content Management Addiction Administrator Directions Entrepreneur Display Technology Tips PCI DSS Accountants Business Managemenet A.I. Books Workers Troubleshooting Recording Optimization Dark Web Environment Free Resource Audit CIO Supply Chain Management Supercomputer HIPAA SSID Upselling Fake News Advertising Flash Worker Health IT Electronic Payment Video Surveillance Staffing Internet Service Provider Google Wallet Migration online Currency Connected Devices Processing Competition Data Warehousing Windows XP AI Wireless Headphones Best Practives Emergency Hard Drive Disposal IT Assessment Society Network Management Wasting Time Access Saving ZTime Regulations Compliance Displays Equifax Fleet Tracking Reading Samsung Business Owner Logistics Virtual Machines G Suite Bookmark Computer Care Remote Working Micrsooft Device security LinkedIn MSP Microserver Employer Employee Relationship IP Address Cyber security Microsoft Excel Employer/Employee Relationships Human Resources Debate Drones Desktop Finance Hacks Physical Security Google Play Application Telephone Service Harddrive Google Drive Windows Server 2008 Supply Chains Nanotechnology Social Network GPS Electronic Health Records Business Cards Archive Service Level Agreement Banking Botnet Managing Costs Spyware Mobile Payment Financial Data Startup Skype Get More Done Asset Tracking Relocation Tablets Microsoft 365 Memes Permissions Language Unified Threat Management Backup and Disaster Recovery Printer Server Sync Browsers External Harddrive Electricity Printing Username Turn Key Medical IT Trend Micro User Tip Proactive Maintenance Managing IT Services Gamification CCTV Digital Signature Security Cameras Threats Point of Contact Screen Reader Trojan Customer Resource management 3D Ebay Surveillance Music Piracy Upload Organize Business Metrics Computer Malfunction Navigation Virtual Machine cache Thin CLient Television switches Telework Writing Smart Tech Reliable Computing IT Fiber-Optic Database In Internet of Things Data Analysis Smart Phones WannaCry Remote Workers Upgrades HTML eCommerce Analytic Telephone System Printers PDF SQL Server Corporate Profile Virtual Private Network Recycling Mobile Security GDPR Managing Risk Time Management Freedom of Information LiFi Adminstration Pirating Information Development Software License Trends Motion Sickness Best Available Tech Keyboard Hypervisor Assessment Leadership SharePoint FinTech Multi-Factor Security Product Reviews Scalability Tip of the week Work/Life Balance Fraud Tactics Read Webinar Fileless Malware Hybrid Cloud Google Calendar Data Storage Deep Learning Devices Messenger Tracking Domains Holidays 3D Printing Capital Personal Information Productuvuty Financial Managing Stress CrashOverride Regulation

toner1