facebook linkedin twitter

Computerware Blog

Cyberattacks are Up at the World Health Organization

Cyberattacks are Up at the World Health Organization

The World Health Organization has been busy dealing with one of the biggest calamities in contemporary times, the COVID-19 pandemic that has had much of the world on pause for the past few months. Unfortunately, they’ve been dealing with an increase in cyberattacks. Today, we’ll take a look at some of the issues the WHO is having with cybercriminals. 

External Threats

With their position at the forefront of society during the pandemic the WHO has unfortunately attracted the less desirables of society, too. Cybercriminals are using the current COVID-19 pandemic, and the WHOs collection for their COVID-19 Solitary Response Fund, to steal information. Other scammers are currently attempting to steal money from people by extracting payment card information and login credentials from retailers and fintech companies. 

There’s also the matter of state-sponsored hacking, which is continuously trying to capitalize on opportunities presented by this emergency to infiltrate and spy on other nations. 

Internal Threats

Internally, the WHO has suffered a significant data breach recently. 450 active WHO email accounts and passwords were leaked by hackers. This is in addition to thousands of emails from people working deliberately on the Novel Coronavirus response. A WHO spokesman said that the attack only affected an old extranet system that staff, former employees, and outside partners use. They have since implemented considerably more secure authentication systems.

It stands to reason that the WHO has been targeted by hackers during this period as cybercriminals are opportunists by nature and COVID-19 is sadly looked upon as such an opportunity. 

If people who are at the forefront of a worldwide response to one of the deadliest viruses in modern history can be hacked, so can you. Call Computerware today at (703) 821-8200 to get the tools and knowledge your business needs to keep your network and infrastructure secure and your data safe.

Tip of the Week: 4 Important Network Management Ac...
Telework Is Turning Some Heads
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, May 27, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Cloud Software Business Management Data Hackers Hardware Microsoft Network Security Workplace Tips Backup Managed Service Provider Hosted Solutions Business Productivity Email Productivity Malware IT Services Saving Money Efficiency Google Computer User Tips Small Business Innovation IT Support Smartphones Data Backup Collaboration VoIP IT Support Quick Tips Network Mobile Devices Business Continuity communications Microsoft Office Gadgets Android Data Recovery Social Media Disaster Recovery Upgrade Cybersecurity Mobile Office Server Communication Virtualization Smartphone Mobile Device Management Miscellaneous Phishing Vendor Management Holiday Ransomware Outsourced IT Passwords Operating System Windows 10 Windows Tech Term Managed IT Services Internet of Things Apps Unified Threat Management Facebook Remote Monitoring Users Mobile Device Automation BDR BYOD Remote Computing Managed IT services Apple Mobile Computing Data Management Analytics Windows 10 WiFi Cloud Computing History Artificial Intelligence Marketing The Internet of Things Firewall Browser Save Money Training Help Desk Alert App Encryption Big data IT Consultant Two-factor Authentication Bandwidth Office Information Technology Spam Office 365 Business Technology Health Budget Bring Your Own Device Antivirus Gmail Managed IT Government Cybercrime Content Filtering Maintenance Going Green Printer Access Control Windows 7 Hard Drives Managed Service Wireless Technology Computers Saving Time Search VPN Outlook Recovery Windows 8 Employer-Employee Relationship Information Retail Best Practice Healthcare Lithium-ion Battery Cost Management Virus Tech Support Hiring/Firing Blockchain Computing Phone System Data Loss Customer Service Travel Education Project Management Update iPhone Humor Networking Hacking IBM Money Augmented Reality It Management Document Management Mobility Patch Management Proactive IT SaaS Computer Repair Running Cable Conferencing Administration Current Events Wireless Law Enforcement Intranet Twitter Data Breach Solid State Drive Compliance Storage Website Data storage Avoiding Downtime Flexibility Risk Management Password Value Legal Save Time Downtime Hacker File Sharing Customer Relationship Management Regulations Covid-19 Hard Drive Data Security Applications PowerPoint Disaster User Hosted Solution Virtual Desktop End of Support Social Networking Social Engineering Social Robot Scam Securty Voice over Internet Protocol DDoS Meetings Monitoring Private Cloud Wi-Fi Digital Telephony Fax Server Black Market Websites Management Cryptocurrency Word Machine Learning Laptop Net Neutrality Vulnerabilities Telephone Systems Cortana Cooperation Business Growth Software as a Service Business Intelligence Excel Vendor Digital Payment Remote Work Router Paperless Office Comparison Tablet Company Culture Google Maps Sports Politics Professional Services Mouse Virtual Reality Downloads Emails Text Messaging Automobile Webcam Specifications Safety Programming Integration Statistics Chromebook Documents User Error Redundancy Smart Devices Computing Infrastructure Hack Co-managed IT IT service Network Congestion Teamwork Heating/Cooling How To Entertainment Managed Services Provider Evernote Download Inbound Marketing Virtual Assistant Bluetooth Streaming Media Lifestyle Multi-factor Authentication Managed Services Telephone Employee/Employer Relationship Start Menu Tech Terms Microchip Taxes eWaste Google Docs Distributed Denial of Service Pain Points Managed IT Service Memory Mobile Technology Experience Chrome Cleaning Public Cloud Licensing Monitors Uninterrupted Power Supply Office Tips Vulnerability Processor Processors Computer Accessories Bitcoin Identity Theft USB YouTube Data Protection Settings Distribution Trending Presentation Gaming Console Unified Communications Remote Workers HTML Human Resources Debate Drones eCommerce IT Fiber-Optic Database Application In Internet of Things Harddrive Organize Data Analysis Employees WannaCry GPS GDPR Managing Risk Time Management Archive Freedom of Information Telephone System SQL Server Corporate Profile Skype Virtual Private Network Mobile Security Permissions Hypervisor Language Assessment SharePoint Multi-Factor Security Cost Scalability External Harddrive Development Software License Trends Motion Sickness Tech Devices Messenger Tracking Holidays Tip of the week Fraud Digital Signature Tactics Fileless Malware Hybrid Cloud Point of Contact Google Calendar Rental Service 3D Ebay Modem Music Strategy Touchscreen News Thin CLient Webinar Proxy Server switches Azure Writing VoIP Procurement UTM Content Term Consultation Legislation Error Smart Phones Cabling Electronic Medical Records Transportation Upgrades Knowledge Video Conferencing IT Plan Enterprise Resource Planning Web Server Accountants PDF A.I. Books Workers Recording Optimization Recycling Communitications email scam Addiction Administrator Directions LiFi Display Technology Tips Analytic Supercomputer Adminstration Pirating Information SSID How To Fake News Best Available Keyboard Leadership Dark Web Free Resource Audit Product Reviews Supply Chain Management Processing Work/Life Balance Data Warehousing Read Wireless Headphones Worker Health IT Deep Learning Internet Service Provider Migration Connected Devices Domains Equifax Fleet Tracking Reading Samsung Best Practives Logistics Virtual Machines Emergency Hard Drive Disposal IT Assessment Network Management Public Speaking Visible Light Communication Wasting Time Access Device security MSP Employer Employee Relationship Cyber security Device Management Microsoft Excel Shortcut G Suite Bookmark IT consulting Computer Care Remote Working Microserver Google Play Telephone Service Google Drive Content Management Windows Server 2008 Nanotechnology Entrepreneur Social Network Employer/Employee Relationships Business Managemenet Desktop Troubleshooting Finance Hacks Physical Security Mobile Payment Startup Environment Asset Tracking Relocation Tablets CIO Microsoft 365 Electronic Health Records Business Cards HIPAA Service Level Agreement Banking Botnet Upselling Advertising Managing Costs Flash Spyware Electronic Payment Username Get More Done Video Surveillance Staffing Medical IT Google Wallet Trend Micro online Currency Memes Unified Threat Management Backup and Disaster Recovery Competition Sync Browsers Windows XP Electricity Printing Turn Key Security Cameras Society Threats Screen Reader Customer Resource management Saving ZTime Printer Server User Tip Proactive Maintenance Displays Managing IT Services Business Owner Gamification Notifications CCTV cache Television Smart Tech Reliable Computing Trojan Solutions Micrsooft LinkedIn Surveillance Piracy Upload IP Address Business Metrics Computer Malfunction Navigation Virtual Machine Printers Managing Stress Regulation CrashOverride Capital Personal Information 3D Printing Productuvuty Financial

toner1