094 90 48200    Get SUPPORT

Aniar IT Services Blog

What Can Be Done to Counter COVID-19-Themed Scams?

What Can Be Done to Counter COVID-19-Themed Scams?

As commonly happens with any disaster, COVID-19 has inspired no short supply of scams. While these scams initially focused upon the relief funds that were delivered to people to help sustain the suffering economy, the ongoing vaccine distribution efforts have given those behind these efforts a new means of attack.

Let’s consider how these scams have materialized over the past year.

The Opportunity COVID-19 Gives Scammers

Like most predators, hackers will fully utilize every advantage they have over their intended prey. With COVID-19, this advantage comes in the form of the desperation many still feel for news. As a result, numerous scams have been reported to reference the coronavirus outbreak, adopting a wide variety of methods.

Some of the old tricks that these scammers have adapted include:

  • Phishing – While phishing scams are nothing new, and certainly won’t end with COVID-19, scammers have certainly taken advantage of it during these tumultuous times. By sending emails and other messages (as we’ll get into) that appear to come from a trustworthy source or an authority, a scammer can manipulate their target into compliance.
    • Vishing – This form of verbal phishing is conducted over the telephone but is otherwise identical to your more typical phishing scams.
    • SMiShing – Once again, a basic phishing attack, but carried out through SMS texts.
  • Pretexting – Basically, this is what occurs when someone reaches out to you seeking out your information under the guise of calling from some trustworthy entity looking for verification. As you would imagine, this has not been uncommon as of late.
  • Spoofing – Spoofing is the act of disguising a URL or a profile to appear to link to one location, but take the target to another, generally malicious one.
  • Quid Pro Quo – Just as it sounds, a scammer offers someone something in return for their information, but never holds up their end of the bargain. A longer scam, this usually requires some level of trust to be established but can be quite lucrative for the miscreant who carries it out.

How to Protect Your Business from Scams

Like most things having to do with cybercrime, there isn’t really a surefire way to prevent such scams from appearing, which means that the onus to keep data safe falls to the user that is dealing with these scams firsthand.

The biggest thing that you can do—and that you should encourage your team to do—is to verify everything. Any time anyone requests something of you online—whether it seems to be your boss, your coworker, your parents, or the CDC—you need to make sure you’re talking to who you think you’re talking to.

Verify. Everyone. And. Everything.

With so much of modern life now utilizing the Internet, it is nothing if not irresponsible to not have an appreciation for the severity of today’s biggest threat landscape. Keeping a good perspective about how valuable your personal information is and treating it as such with best practices can very much help protect you and your business from cybercriminals.

Aniar IT Services is here to help you see to your business’ cybersecurity preparedness and protections. Find out more about what we can offer by calling our team of professionals at 094 90 48200 today.

Tip of the Week: Working with a Virtual Desktop in...
Are Utilities as Secure as They Should Be?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, April 23 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.aniar.ie/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Google Cloud Email Efficiency Privacy User Tips Network Security Internet Workplace Tips IT Support Data Innovation Mobile Device Hosted Solutions Hackers Communication Software Microsoft Business Hardware Collaboration Android Users VoIP Small Business Data Recovery Smartphones Smartphone Data Backup IT Services Managed IT Services Phishing Cybersecurity Computer Windows 10 Backup Network Mobile Devices Communications Tech Term Cloud Computing Miscellaneous Malware Quick Tips Gadgets Managed Service Windows Saving Money Outsourced IT Business Continuity Disaster Recovery Business Management Browser Internet of Things Artificial Intelligence Upgrade Passwords Covid-19 BDR Spam Information Facebook Office 365 Chrome Server Social Media Microsoft Office Holiday Save Money How To Operating System Wi-Fi BYOD Blockchain Automation Router Paperless Office Data Storage Mobile Office Applications Encryption Human Resources Infrastructure Windows 7 Government Patch Management Networking Apps Word Cybercrime Ransomware Computers Data Security Money Connectivity Telephone System Managed IT Vendor Mobile Device Management Machine Learning Display Vulnerability Two-factor Authentication Software as a Service Managed Services Bandwidth Remote Work Staff Information Technology History Remote Data Protection HIPAA Remote Monitoring Settings Data Breach Virtualization Health Big Data Unsupported Software Website Google Docs Hard Drive Law Enforcement Net Neutrality Servers Telephony Office Sports Education Managed Services Provider Scam Access Control Spam Blocking Business Intelligence CES Wireless Update Help Desk Compliance Digital Signage Procurement Fraud Botnet Bring Your Own Device Cryptocurrency IT Management Content Management Training Keyboard Managed IT services Employee/Employer Relationship App VPN Conferencing Augmented Reality Redundancy Meetings Voice over Internet Protocol Password Google Drive Telephone Systems Social Engineering Virtual Assistant Audit Avoiding Downtime Private Cloud IT Plan Business Technology WiFi Processor Comparison OneNote Printing Vendor Management Identity Theft Public Cloud Value Workforce Electronic Medical Records Wire Firewall Managed IT Service Procedure Flash Google Apps Password Management Social Development Customer Service Specifications Addiction MSP Project Management Quick Tip Tip of the week Online Shopping Bing ROI Personal Mobile Data loss Trending Gmail Employee Saving Time Computer Fan Credit Cards PDF Entertainment Warranty Cabling Fiber Optics Sales Messaging Software Tips Data Management Unified Threat Management FinTech HaaS Workers NIST File Sharing ISP Bitcoin Regulations Windows Server 2008 Evernote Cleaning HVAC GDPR Digitize Cortana Alert Recycling Devices Supply Chain Management HBO FENG Printer Cables Trend Micro SharePoint SMS Telecommuting Mobile Computing OLED Using Data Apple Authentication Cache Cryptomining Batteries PCI DSS Computer Care Practices Remote Computing IT Assessment Skype eWaste Thought Leadership Google Search Outlook Amazon YouTube Mouse Default App Shopping End of Support Safe Mode Security Cameras Virtual Machine AI Solid State Drive Travel Smart Office Biometric Security Windows 10s Tools Work/Life Balance Wireless Internet Remote Worker Database Virtual Private Network 5G Downtime Charger Hosted Computing Shortcuts Windows Server 2008 R2 OneDrive Start Menu Screen Mirroring Legal Save Time Frequently Asked Questions Recovery Amazon Web Services Accountants Microchip IT Infrastructure Social Network Customer relationships Multi-Factor Security Password Manager Nanotechnology Smartwatch Hypervisor Hacker Physical Security Document Management Camera Manufacturing Computing RMM The Internet of Things Employer-Employee Relationship Sync Millennials USB Wiring Remote Workers Policy Root Cause Analysis Wireless Charging Inventory Enterprise Content Management Mobility Copiers Cast Criminal Twitter Proactive IT Peripheral Excel Search Engine Investment Virtual Desktop Business Mangement Smart Tech Going Green Digital Signature Printers Virtual Reality Professional Services Employees Hard Drives Search Domains Personal Information CrashOverride Windows 10 Financial Public Speaking Emergency Presentation Managed Service Provider Regulation Lithium-ion battery Hiring/Firing Tech Support Wireless Technology IBM Safety Fun Company Culture Marketing Productivity Budget Customer Relationship Management Competition Managing Stress IP Address