Get Started Today!  (415) 295-4898

croom new

415 IT Blog

How Has COVID-19 Impacted Cybersecurity Needs?

How Has COVID-19 Impacted Cybersecurity Needs?

Data security is always a challenge that businesses must rise to meet, but the COVID-19 pandemic has complicated things significantly by creating situations that make ensuring this security even more difficult. Let’s go over the impacts that many organizations—especially those in the healthcare industry—have had to deal with due, in part, to the coronavirus.

COVID-19 and Cybercrime

Here’s the hard truth: cybercriminals are nothing if not opportunistic. Therefore, it only makes sense that they would take advantage of any situation… even one that has caused as much pain, loss, and conflict as the COVID-19 pandemic has.

It also hasn’t helped matters that many more people are working remotely than ever have before. As people have tried to stifle the spread of the virus, social distancing has become a common precaution, so those who can still perform their job without spending time in the workplace have done so at a much higher rate. While this may be an effective way to limit coronavirus infections, it can have the unintended consequence of promoting malware infections and other cyberthreats.

For instance, many organizations have seen notable increases in the following threats:

Human Error

As more people than ever have been working from home, the likelihood of mistakes has increased considerably. People are less focused with their families at home, in addition to the many distractions that just aren’t present in the office. As a result, they are more prone to errors, which can commonly lead to security incidents. 

Take, for instance, Public Health Wales, one of the 11 member organizations that make up the Welsh branch of the National Health Service. On August 20, somebody in the organization mistakenly uploaded the personal information of 18,105 COVID-positive Welsh residents, where it remained for about 20 hours and was viewed 56 times.

Phishing and Ransomware

Again, while working from home, many people are relying on communication tools, particularly email. Historically, cybercriminals—specifically, phishers—have used email to their advantage as a threat vector to leverage phishing attacks and distribute various forms of malware. Phishing has commonly been used as a means of spreading ransomware in the past, and now that people are still seeking out news regarding the coronavirus, phishing is often easier than ever if related keywords are included.

Credential Hacking and Brute Force Attacks

Last year, businesses were already experiencing a considerable amount of data issues due to their credentials being either stolen, or brute-forced, by hackers. This year, cybercriminals have had even more success with these tactics, as many employees have been functioning outside of the office, its protections, and the heightened awareness that the professional workplace can bring.

Healthcare Organizations May Face the Biggest Risks

Figuring out why cybercriminals so often go after healthcare organizations is a bit of a no-brainer. After all, there are several factors that would encourage this trend:

  • Healthcare organizations possess a significant amount of personally identifiable information and payment card credentials.
  • Due to the strict consequences that a healthcare organization might face following a breach, they may be motivated to pay up just to get the situation over with.
  • If not for that reason, a healthcare organization can’t properly care for their patients without access to their data, adding another motivation for it to comply with a cybercriminal’s demands.

Of course, the current crisis has added its own assortment of complications to many healthcare organizations in terms of their cybersecurity (in addition to the other operational stresses, of course):

  • Telehealth has experienced a growing interest from hackers as more people exercise it as an option.
  • Scrutiny of healthcare organizations and their policies has risen as other breaches are revealed.
  • Contact tracing applications have raised concerns about patient privacy, as data is collected to help protect the public health. Even if these applications are built to be secure, these healthcare organizations will likely have a tough time getting many people on board.

While there are many factors and circumstances that all businesses, especially healthcare organizations, must consider right now, 415 IT can have their back. Give us a call at (415) 295-4898 to learn more about our IT and support options.

Business Continuity Planning a Must
Unify your Communications and Improve Efficiency


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, October 24 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article

QR Code

Tag Cloud

Security Tip of the Week Productivity Technology Best Practices Business Computing Data Data Backup IT Support Network Security Privacy Hosted Solutions Cloud IT Services Internet Data Recovery Efficiency Email Software Business Managed IT Services Malware Outsourced IT Innovation Collaboration Phishing Small Business User Tips Cloud Computing Business Management Hackers Tech Term Upgrade Google Cybersecurity Hardware Mobile Device Windows 10 Microsoft Business Continuity Computer Managed Service Smartphone Mobile Devices VoIp Communication Quick Tips Workplace Tips Covid-19 Ransomware Android Backup Paperless Office Disaster Recovery Managed Service Provider Remote Work Smartphones Encryption Communications Saving Money Network Browser Office 365 Business Technology Data Management Server Wi-Fi Remote Monitoring Managed IT BDR Users Social Media Document Management Internet of Things Artificial Intelligence Healthcare Passwords Vulnerability Help Desk Compliance Windows 7 Holiday Microsoft Office Facebook Government Data Security Save Money Managed IT services Miscellaneous Applications Laptops Blockchain Chrome Analytics Bandwidth Virtualization Information Project Management Processor Automation Mobile Office Tip of the week Health Two-factor Authentication Scam Redundancy Vendor Management Office Employer-Employee Relationship Avoiding Downtime Antivirus Hard Drive Virtual Private Network Apps Windows Storage Router RMM BYOD Machine Learning Proactive Meetings Mobility Data Loss Infrastructure Website Maintenance Software as a Service VPN Gadgets Company Culture IT Management Customer Relationship Management IoT Training Regulations OneDrive Managed Services Employee-Employer Relationship Files Access Control Managed Services Provider File Sharing Wireless Data Storage Remote Workers Time Management Social Network Word Flexibility Mobile Security HIPAA Utility Computing Bring Your Own Device Unified Communications Patch Management Data Breach Password Unified Threat Management WiFi Monitoring Gmail The Internet of Things Cooperation Alert Remote Worker Risk Management File Management Financial Recycling Co-Managed IT Money Server Management Remote Monitoring and Management Payment Cards Operating System Remote Net Neutrality Electronic Health Records Networking Information Technology Employees Tablet Assessment Consulting Downtime Dark Web Search Augmented Reality Instant Messaging Internet Exlporer Smart Technology Professional Services Network Management Management Computing Consultation 5G Mobile VoIP Mobile Device Management Mirgation Virtual Reality Lenovo Settings Personal Information Customer Service Mobile Computing Biometric Travel Wearable Technology Star Wars Firewall Samsung Virtual Assistant Bitcoin Favorites Spam Enterprise Content Management IT Assessment Touchscreen Hacking IT Consulting Manufacturing Vendor Licensing SharePoint GDPR Read Only Security Cameras Identity Theft Enterprise Resource Planning Credit Cards Batteries Asset Tracking Backup and Disaster Recovery App Budget Comparison Wireless Internet Big Data Point of Sale Tech Terms Cache Data Warehousing Heating/Cooling Superfish Transportation Active Directory MSP Finance Geography Gamification Technology Tips Mail Merge User Error CRM Distributed Denial of Service Wasting Time Current Events Conferencing Social Networking Digitize Legislation Trending Smart Devices Specifications Downloads Printing Identity Computers Statistics CIO applications Human Error Screen Reader Employer/Employee Relationships Apple E-Commerce Theft Remote Computing Windows Server 2008 Servers Operations Windows Server Authentication Modem High-Speed Internet Digital Payment Hotspot Address Sensors Electronic Medical Records Tech Support Content Filtering Managed IT Service Database G Suite Shadow IT Hard Disk Drives Black Friday Recovery Notes Mobile Holidays Bluetooth Techology OneNote Permission Smart Tech Proactive Maintenance Solid State Drive Features User Management Authorization Development Outsource IT Mouse Language Solid State Drives IT Technicians Cost Management Break Fix Voice over Internet Protocol Projects Politics Motherboard Chromebook Outsourcing Technology Laws Peripheral Cyber Monday Staff Emergency Multi-Factor Security PowerPoint Display Private Cloud IT Permissions Outlook Disaster Resistance Value of Managed Services How To Test Connectivity Cybercrime Cyber security Procurement Migration eWaste Optimization Microsoft Excel Websites Teamwork WPA3 Cookies Cables Laptop Computing Infrastructure Printer Options Telephone Banking Return on Investment Vulnerabilities Video Conferencing Unified Threat Management PCI DSS Bookmarks ROI Managing Stress Business Telephone Google Calendar Fraud Shortcut Proactive IT Database Management Cyberattacks Social Chatbots Virtual Machines SaaS Shared resources Going Green Fleet Tracking Zero-Day Threat Nanotechnology Wires Remote Working Alerts Reviews Printers Education CEO Students Marketing Daniel Stevens Twitter Regulation

Latest Blog

Google is the standard for online searches. It seems to be as simple as can be. Think of a question, type it in, get an answer. However, not many people likely know just how specific you can make these Google searches with just a few details. Let’s go over how to use Google ...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...