Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Cybercrime Spiking During the Pandemic

Cybercrime Spiking During the Pandemic

Keeping your network and infrastructure free from threats is always a priority, but with so many people working remotely businesses have encountered problems doing so. In fact, hackers, known for their opportunism, have been ultra-opportunistic during this period and it is causing many headaches for network administrators. Let’s take a look at some statistics that are definitely concerning as we head into the fall, where many experts expect the virus to become more problematic. 

Unsecured Remote Desktops at an All-Time High

With so many workers being asked to work remotely, and no time to plan out a strategy to get them secured, many employees are working with unsecured access to company resources. In fact, unsecured remote desktops have risen by over 40 percent. This is a major concern, because cybercriminals can use brute force methods to gain access to a desktop. If that desktop is part of a larger computing network, they gain access to that as well. Not a good situation. 

Speaking of Brute Force Attacks...

With so many unsecured connections out there, brute force attacks are up nearly 400 percent over numbers in 2019. Kaspersky published a report stating as such, and it really isn’t a surprise. IT admins were given no advanced notice that they were to implement all the services employees would need, creating a lot of potential problems. 

COVID-19 Isn’t Just One Virus

Another revelation that has been made is the fact that hackers and scammers are using COVID-19, and people’s hyper awareness of it, against users. This was seen almost immediately as COVID-19-related phishing attacks exploded all around the Internet. In fact, in one month, there were nearly 70 times more COVID-19-related phishing attacks than the previous month. 

These Attacks Are Hitting the Mark

Unfortunately, because people are working remotely and are less likely to scrutinize incoming emails, many of these phishing emails resulted in networks being breached by outside threats. People were the weakest link in your company’s cybersecurity platform before, but without the constant reminders to be vigilant with emails, users are being less careful and it is resulting in issues across the board. 

COVID-19 is a Field Day for Scammers

As mentioned earlier and understood by many security-minded people out there, hackers are opportunists. A global pandemic is just the kind of situation that hackers look to take advantage of; and they have. There are literally billions of COVID-19 pages up on the Internet, so ascertaining which are legitimate and which are nefarious is going to be difficult. Additionally, thousands of domains are added each day, of which 90 percent are scams. Not a good look for humanity when the largest health crisis in decades is met with people trying to steal money and data from others. 

Zooming Right Into Trouble

Remote working means conferencing, and Zoom is one of the biggest beneficiaries of this whole mess. Unfortunately for its users, it can be a risk to use such a useful software. In April it was reported that over 500,000 Zoom credentials were available for purchase on the Dark Web. Additionally, there is a lot of interest in the word “zoom” online, which tells experts that there will be an increase in malicious code being shared with zoom in the name. Experts believe this increase could be up to 200 times more than the norm. Zoom isn’t dangerous to use on its own, it’s just the fact that people aren’t being careful or practicing good cybersecurity hygiene when using the platform.

Other Problems

On top of the spike in COVID-19-related phishing attacks, the brute force attacks, and the Zoom credentials available on the Dark Web, there have been reports of fake contact tracing apps that contain ransomware. Contact tracing is the act of trying to isolate where COVID-19 cases come from to try and eliminate the spread of it. Unfortunately, these apps are now being used to distribute ransomware. Difficult times we’re living in.

Security has to be top of mind no matter what your business is dealing with. If you would like to discuss what you can do to ward off COVID-19-related cyberthreats, call the knowledgeable experts at 415 IT today at (415) 295-4898.

Useful Gadgets for the Remote Worker
A Security Briefing on Chrome Extensions


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, October 24 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article

QR Code

Tag Cloud

Security Tip of the Week Productivity Technology Best Practices Business Computing Data Data Backup IT Support Network Security Privacy Hosted Solutions Cloud IT Services Internet Data Recovery Email Efficiency Software Business Managed IT Services Malware Outsourced IT Innovation Phishing Small Business Collaboration Hackers Business Management Tech Term Upgrade Cybersecurity Google User Tips Cloud Computing Hardware Windows 10 Mobile Device Business Continuity Microsoft Computer Mobile Devices Smartphone Managed Service VoIp Quick Tips Communication Workplace Tips Android Ransomware Backup Covid-19 Disaster Recovery Paperless Office Managed Service Provider Communications Smartphones Remote Work Encryption Office 365 Business Technology Network Data Management Server Browser Saving Money Remote Monitoring Managed IT BDR Users Wi-Fi Document Management Vulnerability Internet of Things Healthcare Passwords Compliance Help Desk Holiday Windows 7 Social Media Artificial Intelligence Government Save Money Managed IT services Applications Miscellaneous Blockchain Laptops Microsoft Office Data Security Chrome Facebook Health Bandwidth Virtualization Two-factor Authentication Redundancy Scam Tip of the week Automation Processor Information Vendor Management Avoiding Downtime Employer-Employee Relationship Antivirus Office Mobile Office Analytics Project Management Storage Employee-Employer Relationship Router Data Loss Apps Machine Learning Maintenance Mobility VPN BYOD RMM Website IT Management Proactive Gadgets Infrastructure Company Culture Meetings Files Access Control Software as a Service Virtual Private Network Customer Relationship Management Windows IoT Regulations Hard Drive Training OneDrive Managed Services WiFi HIPAA Utility Computing Bring Your Own Device Mobile Security Flexibility Alert Managed Services Provider Co-Managed IT Unified Threat Management Remote Workers Wireless Remote Unified Communications Password Gmail Recycling Server Management The Internet of Things Networking Cooperation Risk Management Search File Management Money Assessment Monitoring Net Neutrality Remote Worker Payment Cards Data Storage Network Management Tablet Remote Monitoring and Management Financial Information Technology Consultation Dark Web Augmented Reality Management Operating System Social Network Internet Exlporer Smart Technology Word File Sharing Professional Services Computing Patch Management Data Breach Employees Electronic Health Records Instant Messaging Consulting Downtime Time Management Bookmarks ROI Settings Personal Information Shadow IT Firewall Address Cache 5G Mobile VoIP Content Filtering Heating/Cooling Geography Cyberattacks Social Virtual Assistant Bitcoin Holidays Comparison Trending Licensing Fleet Tracking Zero-Day Threat Manufacturing Vendor Social Networking Technology Tips Statistics Screen Reader Techology Customer Service Batteries Outsource IT Data Warehousing Identity Mobile Device Management GDPR Favorites Transportation Active Directory Outsourcing Distributed Denial of Service Remote Computing Wireless Internet Big Data Legislation Servers Modem High-Speed Internet Read Only Security Cameras Wasting Time Current Events IT Specifications Tech Support Technology Laws Asset Tracking Backup and Disaster Recovery Smart Devices Peripheral G Suite Optimization Digital Payment Bluetooth Hotspot Outlook Smart Tech Disaster Resistance MSP Finance CIO applications Laptop Recovery Operations Emergency Mobile Multi-Factor Security Point of Sale Tech Terms Conferencing Windows Server Video Conferencing Managed IT Service Printer Employer/Employee Relationships Apple Banking Development Printing Database Business Telephone Black Friday IT Technicians Cost Management Unified Threat Management Human Error Hard Disk Drives Sensors PCI DSS Motherboard Chromebook Virtual Machines Mouse Language Shortcut Connectivity Proactive IT Authentication Remote Working E-Commerce Theft Notes Cables User Management Biometric Break Fix Migration eWaste Electronic Medical Records Proactive Maintenance Solid State Drive Websites Cookies Voice over Internet Protocol Projects IT Assessment Cyber Monday Staff OneNote Permission Solid State Drives Permissions Lenovo Vulnerabilities PowerPoint Display Credit Cards Computing Infrastructure IT Consulting Authorization Value of Managed Services Budget Microsoft Excel Samsung Managing Stress Features Nanotechnology Wires Politics Teamwork Gamification Chatbots SharePoint Cybercrime Cyber security SaaS Private Cloud Return on Investment Digitize Mirgation Mail Merge User Error How To Test Options Telephone CRM Google Calendar Fraud Mobile Computing Superfish Procurement Computers Touchscreen Hacking Alerts Wearable Technology Star Wars WPA3 Spam Enterprise Content Management App Shared resources Going Green Virtual Reality Identity Theft Enterprise Resource Planning Downloads Database Management Windows Server 2008 Travel Education Printers Marketing CEO Students Reviews Twitter Daniel Stevens Regulation

Latest Blog

Google is the standard for online searches. It seems to be as simple as can be. Think of a question, type it in, get an answer. However, not many people likely know just how specific you can make these Google searches with just a few details. Let’s go over how to use Google ...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...