094 90 48200     Get SUPPORT

Aniar IT Services Blog

By accepting you will be accessing a service provided by a third-party external to https://www.aniar.ie/

Don’t Let Scammers Scare You with COVID-19

Don’t Let Scammers Scare You with COVID-19

The COVID-19 pandemic has resulted in a great number of people working from home. While this is good for the public health, it may unfortunately lead your employees toward a laxer view of cybersecurity. Cybercriminals are sure to take advantage of this if you aren’t careful, so it is important to be particularly aware of your cybersecurity right now.

The Advantage COVID-19 Gives Hackers

To put it bluntly, diversion. With so much attention rightly given to COVID-19 right now, there are many who are remaining in their homes as much as possible to try and prevent the pathogen from propagating. This approach makes the Internet even more important to so many people. Not only are many businesses operating remotely, many rely on support services and other online functions for their in-house processes. Otherwise, people who cannot work remotely are seeking ways to pass the time, turning to social media and other online services for that.

As a result, a huge number of people are online.

This creates the perfect storm for a scammer or hacker to take advantage of, as they now have a larger pool of potential victims. On top of that, the COVID-19 situation also gives them another opportunity to fool people into handing over their access credentials to personal and business accounts.

Between March 9th and April 26th, a total of 1.2 million domains were created that have something to do with COVID-19. 86,600 of these domains lead to malicious websites, 80 percent of which distribute malware to anyone unlucky enough to interact with them.

As far as phishing attacks and spam go, more of these are also popping up. COVID-19-themed scams are popping up in the form of fake emails, spoofed to look like they come from the IRS, the CDC, healthcare organizations, and various other companies.

Preventing the Influence of Scams

With so many scams and threats out there, vigilance is crucial… especially when you and your team may be working remotely. Any of the security best practices that people should be following in the office need to be particularly focused upon when you’re in the home. For instance:

  • Phishing awareness – Phishing can strike through a variety of outlets, from email, instant messaging, social media, and even telephone calls. Being able to spot these attempts is needed if your business is going to remain secure.
  • Maintain password standards – Many people have separate standards for their home passwords and their business passwords. You need to discourage this by reinforcing the importance of good password hygiene in all environments.
  • Back up your data – Data is important, regardless of where it is accessed. Maintaining a backup and securing it with antivirus and firewall is important.

At Aniar IT Services, we have the professionals with the experience needed to properly secure your network as you continue your operations. To learn more about what we can offer, give us a call at 094 90 48200 .

People Have Been Working From Home Longer than You...
Tip of the Week: 3 Crucial Considerations when Man...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, July 10 2020

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Business Computing Productivity Best Practices Privacy Cloud Innovation User Tips Email Workplace Tips Network Security Hosted Solutions Internet Efficiency Microsoft IT Support Data Hardware Software Hackers Google Data Backup Business Communication Data Recovery Cybersecurity Smartphones VoIP Small Business Tech Term Managed IT Services Cloud Computing Communications Collaboration Mobile Devices IT Services Windows 10 Phishing Backup Computer Android Gadgets Users Malware Business Continuity Mobile Device Artificial Intelligence Saving Money Smartphone Outsourced IT Network Browser Miscellaneous Windows Information Disaster Recovery Business Management Facebook Internet of Things BDR Server Upgrade Spam Managed Service Chrome Office 365 How To Quick Tips Social Media Automation Passwords Router Computers Data Security Applications Data Storage Windows 7 Blockchain BYOD Paperless Office Holiday Apps Word Cybercrime Microsoft Office Money Virtualization Display Encryption Managed IT Human Resources Infrastructure History Networking Staff Mobile Device Management Bandwidth Government Data Breach Vulnerability Remote Work Two-factor Authentication Wi-Fi Operating System Data Protection Patch Management Save Money HIPAA Ransomware Telephone System Remote Monitoring Connectivity Settings Sports Machine Learning Access Control Compliance Digital Signage Law Enforcement Big Data Cryptocurrency Telephony Employee/Employer Relationship Website CES Unsupported Software Fraud Software as a Service Scam Training Update Mobile Office Business Intelligence Keyboard Content Management VPN Spam Blocking Botnet Processor Password Virtual Assistant Managed IT services Bring Your Own Device Redundancy Voice over Internet Protocol Vendor Management IT Management Business Technology App Telephone Systems Hard Drive Meetings Health Social Engineering Augmented Reality Avoiding Downtime Google Drive Education Managed Services Provider Identity Theft Servers Audit Comparison Vendor Procurement Private Cloud IT Plan OneNote Help Desk Google Docs Printer Tip of the week Remote Computing IT Assessment Workers Specifications Batteries PCI DSS Data Management Mobile Computing Default App Shopping Evernote Cleaning Trending Managed Services Public Cloud Biometric Security Information Technology HaaS Virtual Machine AI Recycling Devices Cryptomining Computer Fan YouTube Mouse Windows Server 2008 Windows Server 2008 R2 OneDrive Authentication Data loss Google Search Virtual Private Network Smart Office HBO IT Infrastructure Social Network Practices Safe Mode Security Cameras Covid-19 Cache Software Tips Policy Telecommuting Manufacturing Computing Amazon Shortcuts Hypervisor Remote Wireless eWaste Thought Leadership Remote Worker Database FENG Microchip Computer Care Copiers Cortana Alert Save Time Remote Workers Procedure Document Management Camera Outlook Investment Printing Charger Hosted Computing Smartwatch Skype Peripheral Wireless Internet Travel Virtual Reality Professional Services Amazon Web Services Accountants Enterprise Content Management Mobility Going Green Legal Wiring Managed IT Service Search Engine Development Password Manager Nanotechnology Proactive IT Tools Work/Life Balance Solid State Drive FinTech Printers Frequently Asked Questions Recovery ROI Personal Wireless Charging Inventory Start Menu Project Management Quick Tip USB Cabling Fiber Optics Downtime Password Management Social Sync Multi-Factor Security Saving Time Office 5G Criminal Twitter Windows 10s Firewall Digital Signature Bing WiFi Messaging Business Mangement Smart Tech Screen Mirroring MSP Net Neutrality Millennials Physical Security Entertainment Warranty Excel GDPR Digitize Hacker Google Apps Employer-Employee Relationship Employee Bitcoin The Internet of Things Regulations Electronic Medical Records Wire Unified Threat Management Cables Trend Micro Online Shopping Root Cause Analysis NIST Supply Chain Management Addiction OLED Using Data Credit Cards PDF HVAC Flash SMS Gmail Cast File Sharing ISP Value Workforce IP Address Hard Drives Customer Service Search Regulation Domains CrashOverride Windows 10 Company Culture Emergency Public Speaking Managed Service Provider Presentation Managing Stress Lithium-ion battery Hiring/Firing Tech Support Wireless Technology IBM Fun Personal Information Safety Marketing Productivity Budget Customer Relationship Management Financial Competition