facebook linkedin twitter

Computerware Blog

Cybersecurity Has Also Felt the Influence of COVID-19

Cybersecurity Has Also Felt the Influence of COVID-19

While businesses have always needed to focus on their data security, the COVID-19 pandemic has only made this more of a challenge. Let’s go over why this is, and how many industries (especially the healthcare industry) have had to adjust as a result.

How COVID-19 and Cybercrime are Connected

Cybercriminals are notoriously opportunistic, and so will not hesitate to work any situation or circumstance that might improve their chances of success. Unfortunately, in their eyes, the COVID-19 pandemic fits the bill just fine.

Think about it—while many people are trying to return to the workplace, the likelihood is that the resurgence of the virus will send many people back to remote work. Most still practice social distancing as much as possible, still making it a wiser choice to work remotely, if the option is there. Don’t get us wrong, this is a great way to keep a business running without exposing people to unnecessary risk of infection. Unfortunately, doing so may help expose your business to cybersecurity risks. Many organizations have experienced the following at a significantly higher rate:

Human Error

While remote work can bring a lot of benefits to both an organization and its employees, it can increase the chance of a severe human error taking place. With reopening efforts met with a resurgence in infections, remote work may be the safest option for some time.

So, with the distractions of the home, combined with the shared anxieties that many of us are currently feeling, errors are going to be more likely. Unfortunately, these errors can often enable security incidents to take place.

We can look to Public Health Wales—one of the 11 organizations that form the Welsh branch of the National Health Service—as an example. On August 20, the personal information of 18,105 Welsh residents was uploaded to a public database, where it was visible for about 20 hours (and was viewed 56 times during that period).

Phishing and Ransomware

Working remotely also means that communication tools will be used even more frequently than they already were, giving cybercriminals another opportunity to strike using tools like email to their advantage. Cybercriminals have long distributed malware and achieved their other goals by phishing their targets through email. With many people anxious for updates about the coronavirus, as well as the upcoming election, cybercriminals essentially have a playbook of promising keywords to use in their phishing messages.

Credential Hacking and Brute Force Attacks

Even last year, credential theft and brute force attacks were already causing no small amount of trouble for businesses. This year has seen more of the same, especially because many employees are working remotely… away from the office’s defenses and cybersecurity culture.

Healthcare Organizations are Preferred Targets

Sickening as it is to consider, the phenomenon that cybercriminals are increasingly attacking healthcare providers and associated businesses makes a lot of sense. Just consider:

  • There’s a lot of personally identifiable data stored by medical providers, including credit card credentials.
  • Healthcare organizations are likely to pay a cybercriminal to avoid some of the consequences of a disclosed data breach.
  • Obviously, these organizations are also motivated to pay by the pressing need for the data they store to properly care for their patients.

This has also been complicated by the nature of our current shared predicament:

  • Telehealth has become more popular, making it more valuable for a hacker to target.
  • As breaches have been revealed, healthcare organizations and their data protection policies are under closer examination.
  • Patient privacy concerns are being raised as contact tracing applications are developed and deployed. Healthcare providers may find it challenging to get people to use them.

Any situation brings a lot of different factors for a business to consider. In this case, it just so happens to be a pandemic, which unfortunately stresses an already pressure-filled industry. Regardless, Computerware is here to help ensure that a business’ IT doesn’t become a concern. To learn more about what we can offer you, give us a call at (703) 821-8200.

IT Help Desk and Its Business Benefits
Tip of the Week: Simple Steps to Safer Email Pract...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, October 31, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Software Cloud Data Hackers Business Management Hardware Workplace Tips Microsoft Network Security Backup Productivity Business Hosted Solutions Managed Service Provider Email Productivity IT Services Malware Efficiency Saving Money Google Innovation Small Business Computer User Tips Collaboration IT Support VoIP Quick Tips Data Backup Network IT Support Smartphones communications Mobile Devices Data Recovery Business Continuity Gadgets Disaster Recovery Microsoft Office Android Cybersecurity Social Media Smartphone Upgrade Phishing Mobile Office Server Communication Virtualization Miscellaneous Mobile Device Management Mobile Device Ransomware Passwords Windows Users Vendor Management Operating System Holiday BDR Outsourced IT Internet of Things Tech Term Managed IT Services Windows 10 Apps Facebook Unified Threat Management Remote Monitoring Automation BYOD Analytics WiFi Managed IT services Remote Computing Apple Mobile Computing Data Management Windows 10 Marketing Training The Internet of Things Browser History Cloud Computing Artificial Intelligence Covid-19 Help Desk Business Technology Save Money Firewall Spam Health Encryption Alert App Big data Information Technology Office 365 Budget Two-factor Authentication Bandwidth Managed Service IT Consultant Office Going Green Access Control Maintenance Printer Hard Drives Gmail Windows 7 Bring Your Own Device Government Blockchain Managed IT Antivirus VPN Cybercrime Information Content Filtering Best Practice Lithium-ion Battery Healthcare Remote Work Document Management Hiring/Firing Virus Tech Support Wireless Technology Computers Recovery Saving Time Search Employer-Employee Relationship Retail Wi-Fi Cost Management Networking Outlook Windows 8 Computing IBM Money Humor Augmented Reality Customer Service Data Security It Management Storage Data Loss Conferencing Travel Phone System Education Update Hacking Project Management iPhone Save Time Downtime SaaS Vendor Customer Relationship Management File Sharing Law Enforcement Applications PowerPoint Hard Drive Wireless Computer Repair Running Cable Proactive IT Compliance Mobility Website Patch Management Solid State Drive Administration Data storage Flexibility Intranet Voice over Internet Protocol Twitter Data Breach Laptop Current Events Value Password Avoiding Downtime Legal Hacker Risk Management Regulations Fax Server Vulnerabilities Telephone Systems Chrome Paperless Office Business Intelligence Sports Cooperation Excel Software as a Service Digital Payment Disaster Router User Virtual Desktop End of Support Hosted Solution Social Robot Comparison Tablet Securty Company Culture Google Maps DDoS Social Networking Social Engineering Black Market Scam Word Cryptocurrency Meetings Monitoring Business Growth Private Cloud Cortana Digital Telephony Websites Management Net Neutrality Machine Learning Employee/Employer Relationship Distributed Denial of Service USB Managed IT Service Mobile Technology YouTube Lifestyle Presentation Unified Communications Settings Uninterrupted Power Supply Public Cloud Licensing Processor Computer Accessories Specifications Safety Vulnerability Bitcoin Identity Theft Data Protection Notifications IT service Trending Documents Gaming Console Teamwork Heating/Cooling Mouse Distribution Entertainment Solutions Virtual Reality Employees Text Messaging Downloads Politics Professional Services Webcam Programming Emails Bluetooth Statistics Automobile Network Congestion Chromebook Cost Integration Computing Infrastructure Hack Redundancy Smart Devices eWaste Google Docs Memory How To Experience Video Conferencing Streaming Media User Error Download Managed Services Provider Inbound Marketing Evernote Co-managed IT Monitors Virtual Assistant Cleaning Office Tips Multi-factor Authentication How To Microchip Taxes Managed Services Telephone Processors Pain Points Start Menu Tech Terms Network Management Wasting Time Access Regulations Compliance Displays Device Management Equifax Fleet Tracking Reading Samsung Business Owner Logistics Virtual Machines Emergency Hard Drive Disposal IT Assessment Society Bookmark Computer Care Remote Working Micrsooft Content Management Device security MSP Employer Employee Relationship IP Address Cyber security Microsoft Excel Business Managemenet G Suite Drones Best Practives Desktop Finance Hacks Physical Security Google Play Application Telephone Service Google Drive Windows Server 2008 Supply Chains Nanotechnology Social Network Employer/Employee Relationships Human Resources Upselling Business Cards Service Level Agreement Banking Botnet Managing Costs Video Surveillance Spyware Mobile Payment Financial Data online Currency Startup Asset Tracking Relocation Tablets Microsoft 365 Electronic Health Records Sync Browsers Electricity Printing Username Medical IT Trend Micro Saving ZTime Memes Permissions Language Microserver Unified Threat Management Backup and Disaster Recovery Managing IT Services Gamification CCTV Digital Signature Security Cameras Threats 2FA LinkedIn Screen Reader Customer Resource management User Tip Proactive Maintenance Music Get More Done Piracy Upload Business Metrics Computer Malfunction Navigation Virtual Machine Debate cache Television switches Telework Writing Smart Tech Reliable Computing Harddrive Surveillance In Internet of Things Data Analysis GPS WannaCry Remote Workers Upgrades Archive Printer Server HTML eCommerce IT Skype Turn Key Fiber-Optic Database Corporate Profile Virtual Private Network Trojan Mobile Security GDPR External Harddrive Managing Risk Time Management Freedom of Information LiFi Remote Telephone System Printers PDF SQL Server Development Point of Contact Software License Trends Motion Sickness Best Available Tech Keyboard Hypervisor Assessment SharePoint FinTech Organize Multi-Factor Security Scalability Fileless Malware Hybrid Cloud 3D Ebay Google Calendar Data Storage Deep Learning Devices Messenger Tracking Domains Holidays Thin CLient Tip of the week Work/Life Balance Fraud Tactics Proxy Server Azure VoIP Procurement UTM Content Rental Service Modem Public Speaking Smart Phones Strategy Touchscreen News Visible Light Communication Analytic IT Plan Enterprise Resource Planning Web Server Term Shortcut Consultation IT consulting Organization Recycling Legislation Error Cabling Electronic Medical Records Transportation Knowledge Addiction Administrator Directions Entrepreneur Display Adminstration Pirating Information Technology Tips PCI DSS Webinar Accountants A.I. Books Workers Troubleshooting Recording Optimization Leadership Communitications Product Reviews email scam Dark Web Environment Free Resource Audit CIO Supply Chain Management Read Supercomputer HIPAA SSID Fake News Advertising Flash Staffing Internet Service Provider Google Wallet Migration Connected Devices Processing Competition Data Warehousing Windows XP AI Wireless Headphones Worker Health IT Electronic Payment Personal Information Productuvuty Financial Managing Stress CrashOverride Regulation Reviews 3D Printing Capital

toner1