Attend IT Limited Blog

COVID-19 Pandemic Exacerbating Cyberthreats

COVID-19 Pandemic Exacerbating Cyberthreats

Keeping your network and infrastructure free from threats is always a priority, but with so many people working remotely, businesses have encountered problems doing so. In fact, hackers and scammers have come out of the woodwork to try and gain entry into unauthorized networks or to flat-out steal data. This month, we thought we would take a look at how the COVID-19 pandemic has exacerbated the threats out there. 

Unsecured Networks

A lot of people are working remotely. In fact, one study showed that 58 percent of all knowledge workers--which are workers that deal in information--are now working remotely. With so many people being asked to work remotely, and no time to plan out a strategy to get them secured, many employees are working with unsecured access to company resources. In fact, unsecured remote desktops have risen by over 40 percent. This is a major concern, because cybercriminals can use brute force methods to gain access to a desktop. If that desktop is part of a larger computing network, they gain access to that as well. Not a good situation. 

Speaking of Brute Force Attacks

With so many unsecured connections out there, brute force attacks are up nearly 400 percent over numbers in 2019. Kaspersky published a report stating as much, and it really isn’t a surprise. IT administrators were given very little or no advanced notice that they were to implement all the services employees would need. This created the current situation where there are many problems securing authentication points and keeping software effectively updated.

There Is Not Just One Virus Going Around

Hackers and scammers are using COVID-19, and the fact people are almost universally concerned about it in one fashion or another, to overcome people’s cyber awareness. This was seen almost immediately as COVID-19-related phishing attacks were deployed en masse. In fact, in April of 2020, there were nearly 70 times more COVID-19-related phishing attacks than the previous month. 

Success Rates for Hackers are Improving

Since people are constantly accessing Internet-based resources, and are getting messages from all over, many people are less deliberate in their ongoing scrutiny of incoming emails, the predominant vector phishing attacks come in. The truth is that people were the weakest link in a company’s cybersecurity platform before the pandemic, but it pales in comparison to how much of a liability some are today without constant oversight. 

COVID-19 is a Field Day for Scammers

As mentioned earlier and understood by many security-minded people out there, hackers are opportunists. A global pandemic is just the kind of situation that hackers look to take advantage of; and they have. There are literally billions of COVID-19 pages up on the Internet, so ascertaining which are legitimate and which are nefarious is going to be difficult. Additionally, thousands of domains are added each day, of which 90 percent are scams. Not a good look for humanity when the largest health crisis in decades is met with people trying to steal money and data from others. 

A Change in Perspective is Needed

Technology’s job is to support the way people work, and with today’s strategies in place, more attacks are resulting in more breaches. This is largely because--even with a sharp change in strategy--companies are still trusting their users to do the right thing. They know that most of them will, and some won’t. The only way to get ahead during these uncertain times is to move to a zero trust strategy.

That’s not to say that users aren’t still going to have to do the right things, but under the zero trust model, the user is allowed to access their work regardless of where they are or what machine they are using. It’s less critical because instead of monitoring user behavior the zero trust model relies on the constant monitoring of the machines being used. Zero trust strategies constantly interrogate the network signal, the machine they are on, the data that is being transmitted, and the health of the software that is being used. If something is off, it is noticed and remediated immediately. 

In the new zero trust perspective, risk is managed on a case-by-case basis, and that level of hyper awareness will go a long way toward mitigating further risk. During the COVID-19 pandemic, scammers have run rampant, video conferencing has been hijacked, phishing emails are more common and intricate than ever, but they don’t have to hurt your business. None of these circumstances matter when you seal up your network in a way where the most risk is mitigated. 

If you would like to know more about how the COVID-19 pandemic has affected business and technology, or you would like to learn more about zero trust strategies and how to coordinate your business’ cybersecurity initiatives to give your newly remote workforce the best chance to help your business grow and prosper, call the IT professionals at Attend IT Limited today at 020 8626 4485.

Improve Your Business’ Wi-Fi
Backup Can Really Save Your Business’ Bacon

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Network Security Business Computing Tip of the Week Best Practices Productivity Cloud Managed IT Services Data Backup communications Hosted Solutions Data Recovery Disaster Recovery Privacy VoIP Hackers Malware Backup Business Continuity Data Business Small Business IT Services Outsourced IT Email Innovation Cloud Computing IT Support Software Efficiency Cybersecurity Productivity Mobile Devices Phishing Computer Internet IT Support Saving Money Smartphone Internet of Things Hardware Upgrade BDR Business Management Automation Collaboration Mobile Device Management Managed IT services Server Microsoft Managed IT Information Technology Covid-19 Risk Management Network Mobility Ransomware User Tips BYOD Avoiding Downtime Budget Save Money Compliance Windows 7 Communication Workplace Tips Managed Service Provider Artificial Intelligence Wi-Fi Data Management Hosted Solution Cost Management Meetings Wireless Virtual Private Network Remote Computing Managed Service Computers Spam Firewall Passwords Password Smartphones Gadgets History Quick Tips MSP Users VPN Personal Information Remote Work Audit Google Telephony Microsoft Office IT Service Telephone Systems Router Automobile Redundancy Tech Term Value Hybrid Cloud Remote Workers Networking End of Support Data Breach Saving Time Android Data Security Business Technology Hard Drives Employer-Employee Relationship Windows 10 Document Management Employee-Employer Relationship Devices Content Filtering Marketing Solid State Drive Recovery Printing Human Resources Wireless Internet Conferencing Training Instant Messaging Paperless Office Manufacturing Fiber Optics Virtualization Payroll Azure Content Filter Administration e-waste Apple Transportation PCI DSS Gamification Mobile Office Bandwidth Wireless Technology Backup and Disaster Recovery Company Culture Smartwatch Computer Repair Analysis Virtual Assistant Cybersecurty Telephone Windows Server 2008 Shadow IT Big Data intranet Social Media Laptop Government SMB Active Directory The Internet of Things Office Evernote Proactive IT Monitoring Private Cloud Colocation User Error Going Green Regulations Compliance Development Mobile Computing Chromebook Applications Money Break/Fix Window 10 Black Market Commerce Alexa for Business Downtime Antivirus Word Employees Upgrades Cost Windows Server Mobile Video Conferencing Management Printers Hacker Data Loss Managed Services Students Utility Computing Help Desk AI Smart Tech Vendor Flexibility Online Storage Business Intelligence Education Cleaning iPhone E-Commerce Holiday Windows 10 Cybercrime Copiers Browser Remote Dark Web Work/Life Balance Professional Services Workers Outsource IT Financial Technology Phone System Unified Communications Operating System Hacking Time Management Connectivity Facebook Customer Relationship Management App Social Engineering Application Proactive WPA3 Payment Cards Entertainment Samsung Advertising Voiceover Internet Protocol Disaster Lifestyle Wasting Money Machine Learning Office 365 Travel Project Management Remote Monitoring Vulnerability Regulation Save Time Smart Technology Workstations Streaming Media Update Voice over Internet Protocol SaaS Managed IT Service Spyware Printer Two-factor Authentication File Storage Legal Mobile Device OneNote HIPAA Software as a Service Business Telephone Data Protection Encryption Electronic Medical Records IoT Computing Remote Working Amazon Nanotechnology WiFi Data Storage Analytics File Sharing Organization Financial iOS Sync WannaCry Camera Humor Tech Support Access Control Troubleshooting IT solutions Patch Management Point of Sale Gifts Data Theft Hard Drive Search Facebook Privacy PDF Best Practice IT Management Safety Comparison Language Reviews Root Cause Analysis NFL Maintenance Workstation Twitter YouTube Unified Threat Management Screen Mirroring Storage Bring Your Own Device Identity Theft Licensing Net Neutrality Projects How To Charger Fraud Memory Admin CRM Windows 10s Outlook Settings Politics Apps Server Maintenance Inventory Managing Stress Emergency Specifications App store Google Drive Relocation Myths Augmented Reality Vendor Management eWaste Telework Computer Forensics Hyperlink Current Events Holidays Cast USB Books Sports IT budget Chrome Law Enforcement Computer Fan Worker Commute Scam Experience Edge Keyboard Hard Disk Drive Shortcut Credit Cards Alert 5G Business Strategy Wasting Time Text Messaging Investment Communitications Sales Virus Mobile Security Information Video Games Threats Windows Ink Device Security Audits Gmail OneDrive Consultant Virtual Reality Cortana Blockchain Reputation Security Cameras Processor Google Docs Ciminal Robot Policy Keyboard Shortcuts Micrsosoft Excel FAQ Scalability Medical IT Solutions PowerPoint Accessory Office Tips ROI Hosted Desktop Emails IT Solutions Worker Retail Identity Health Scams Television CrashOverride Google Maps Sabotage HBO Identities Innovations Benchmarks Computer Care Updates Internet Service Provider Display Music Microsoft Excel Procedure HaaS Digital Signage Adobe Wireless Charging Testing Internet Exlporer eCommerce Peripheral Windows Server 2008 R2 Smart Devices Webinar WIndows Server 2008 Battery Websites Data Privacy Miscellaneous Windows Employee Managed Services Provider PC Touchscreen Legislation Social Unsupported Software Computer Accessories Tablets Microsoft Word Google Assistant Co-Managed Services