Get Started Today!  (415) 295-4898

croom new

415 IT Blog

We Need to Flatten the Curve of Cybersecurity Risk

We Need to Flatten the Curve of Cybersecurity Risk

People have been examining the COVID-19 pandemic and the resulting economic and social shutdown from every angle. Unfortunately, some of those people took it as the opportunity they’ve been waiting for to try and steal data and in some cases money from unprotected and unprepared people and businesses online. Let’s examine how the events surrounding COVID-19 have had an effect on cybercrime.

A Variety of Threats

Today, there are a lot of threats out there that could threaten a business’ data and infrastructure. This has been exacerbated by the fear brought on by the COVID-19 pandemic and most businesses don’t know where to start setting up their defenses. Most of the threats are in line with threats that they normally deal with, but many are seeing an increased frequency of them. By using COVID-19 as a ruse, cybercriminals threaten to take advantage of people's empathy. Some of the threats that business see:

  • Phishing attacks 
  • Distributed denial of service attacks
  • Man-in-the-Middle attacks
  • Network based user threats due to negligence or sabotage

Of course, any of these threats can undermine your business’ ability to function properly, let’s look at the latest scams businesses are actually dealing with:

Website Spoofing

People shouldn’t have to deal with these types of things during a public emergency, but scammers have been setting up spoofed websites to take advantage of people’s tendency to think it is less risky shopping online. From fake government websites to websites that claim to make available discount face masks or hand sanitizers (a couple of the new staples from the pandemic) are being set up to steal people’s personal information. Using this information, the more sophisticated hackers can gain access to people’s accounts, leaving individuals, and the businesses they work for, reeling. Here are a couple things you can do to keep from being a victim of false websites:

  • Check the URL - A fake site might look just like the real thing, but the URL won’t. With a lot of these scams being run on government and banking websites, you will want to remain diligent to check the URL by running your mouse over any links or buttons on a page or webform. If you can’t see where the information is going, or if the address you find is suspicious, don’t send any of your personal information through the website. 
  • Use Ad Blockers - Another great way to skim out fraudulent shady information is to utilize ad blocking software available through your browser’s store.

Email and Text Phishing

Of course, phishing is a big deal all the time as encryption does a good job of keeping traditional hackers out of their networks. Of course, phishing tactics change all the time, and since impersonating someone to gain access to personal information is one of the oldest and successful schemes on the web, it continues to be innovated upon. With over three billion phishing emails sent each day, unless you and your staff know how to spot and mitigate these threats, your organization will fall victim to one eventually. Here are a few strategies you can use to mitigate the risk from phishing emails:

  • Confirm the Sender - The only way phishing emails work is when the person receiving the message trusts the information they are being sent. Ensuring that the message you’ve received is from who it says that it is from is one of the first steps in thwarting any phishing attempt.
  • Don’t Click on Links and Attachments - Even a well-trained eye can be fooled by some link that looks legitimate but isn’t. It is important that if you aren’t expecting an email, or if you don’t personally know the person or organization that’s sending you messages (and their motives), don’t click on anything. 

Cybercrime will be here a lot longer than COVID-19 will be. It’s important that you take the steps necessary to protect your business (and yourself) from the threats presented by scammers online. For more information on how to stop COVID-19-based cyberthreats, or if you would just like to improve your business’ ability to train your staff on the importance of cybersecurity best practices, reach out to 415 IT today at (415) 295-4898.

Tip of the Week: Make Email Simpler
The Pandmeic Era Internet


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, November 28 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article

QR Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing Data IT Support Data Backup Network Security Privacy Hosted Solutions Cloud IT Services Efficiency Internet Email Data Recovery Software Managed IT Services Business Malware Outsourced IT Innovation Phishing Collaboration Google User Tips Small Business Hackers Mobile Device Cybersecurity Tech Term Upgrade Business Management Cloud Computing Hardware Managed Service Computer Business Continuity Windows 10 Microsoft Mobile Devices Smartphone Android Workplace Tips Smartphones Quick Tips VoIp Communication Ransomware Covid-19 Backup Disaster Recovery Managed Service Provider Paperless Office Communications Encryption Remote Work Business Technology Network Data Management Wi-Fi Browser Saving Money Server Office 365 Remote Monitoring Managed IT Users Help Desk BDR Vulnerability Internet of Things Passwords Holiday Save Money Windows 7 Document Management Healthcare Compliance Social Media Artificial Intelligence Miscellaneous Laptops Managed IT services Chrome Government Microsoft Office Data Security Automation Facebook Applications Blockchain Office Two-factor Authentication Redundancy Employer-Employee Relationship Scam Tip of the week Analytics Vendor Management Avoiding Downtime Bandwidth Information Windows Antivirus Virtualization Mobile Office Project Management Health Processor Infrastructure Data Loss Remote Software as a Service Hard Drive Maintenance Employee-Employer Relationship VPN Router Mobility Storage Networking Apps Wireless Machine Learning Gadgets OneDrive Files Managed Services Access Control IT Management Training Virtual Private Network RMM Customer Relationship Management Website Proactive Meetings Company Culture BYOD Regulations IoT Money Co-Managed IT Management Alert Employees File Sharing Net Neutrality Electronic Health Records File Management Instant Messaging Unified Threat Management Consulting Downtime Tablet Dark Web Augmented Reality Payment Cards Internet Exlporer Smart Technology Bring Your Own Device Display HIPAA Managed Services Provider Utility Computing Information Technology Server Management Search Remote Workers Computing Data Storage Professional Services Assessment Flexibility Social Network Mobile Security Recycling Network Management Unified Communications Consultation Word Monitoring Patch Management Data Breach Remote Worker Gmail Password Remote Monitoring and Management The Internet of Things Financial Cooperation WiFi Risk Management Time Management Operating System Outsource IT Heating/Cooling Employer/Employee Relationships Apple How To Nanotechnology Test Wires Mouse Language Windows Server Chatbots Private Cloud Break Fix Hard Disk Drives Sensors WPA3 Mobile Computing Trending Database Techology Mirgation Procurement Outsourcing Cyber Monday Staff Spam Enterprise Content Management Peripheral Permissions Statistics Notes Wearable Technology Star Wars IT Bookmarks Enterprise Resource Planning ROI Laptop Microsoft Excel Servers Proactive Maintenance Solid State Drive App Optimization Computing Infrastructure User Management Technology Laws Identity Theft Solid State Drives Emergency Fleet Tracking Multi-Factor Security Zero-Day Threat Geography Banking Voice over Internet Protocol Outlook Projects Disaster Resistance Cyberattacks Cache Social Video Conferencing Recovery Value of Managed Services Printer Social Networking Customer Service PCI DSS Google Calendar Fraud Bluetooth PowerPoint Mobile Device Management Business Telephone Unified Threat Management Identity Favorites Remote Working Cybercrime Cyber security Screen Reader Virtual Machines Alerts Teamwork Virtual Reality Options Telephone Asset Tracking Modem Backup and Disaster Recovery High-Speed Internet Reviews Travel Shortcut Return on Investment Proactive IT Remote Computing Read Only Security Cameras Biometric Firewall MSP Finance G Suite Tech Support Point of Sale Tech Terms IT Assessment Shared resources Going Green Conferencing Mobile Budget Websites Database Management Lenovo Smart Tech Credit Cards Comparison Licensing Data Warehousing 5G Samsung Mobile VoIP Human Error Development End of Support Technology Tips Settings Personal Information IT Consulting Printing Gamification Distributed Denial of Service Manufacturing Vendor SharePoint Motherboard Authentication Chromebook CRM Legislation Virtual Assistant Bitcoin IT Technicians E-Commerce Cost Management Theft Digitize Mail Merge Batteries User Error SaaS GDPR Superfish Connectivity Electronic Medical Records Computers Specifications Operations Wireless Internet Big Data OneNote Cookies Permission Cables Windows Server 2008 Digital Payment Hotspot Transportation Active Directory Migration eWaste Managed IT Service Smart Devices Downloads Authorization Vulnerabilities Content Filtering Touchscreen Hacking Wasting Time Current Events Features Shadow IT Black Friday CIO applications Address Politics Managing Stress Holidays Education CEO Regulation Students Daniel Stevens Marketing Printers Twitter

Latest Blog

We realize that it’s one thing for us to tell you how important it is to update your software. After all, we’re tech guys, so we worry about that kind of thing all the time. Hopefully, it’s quite another matter when Homeland Security does it, which is why we’re really hoping...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...