312-253-4321    Get SUPPORT

Alchetec Blog

By accepting you will be accessing a service provided by a third-party external to https://www.alchetec.com/

We Need to Flatten the Curve of Cybersecurity Risk

We Need to Flatten the Curve of Cybersecurity Risk

People have been examining the COVID-19 pandemic and the resulting economic and social shutdown from every angle. Unfortunately, some of those people took it as the opportunity they’ve been waiting for to try and steal data and in some cases money from unprotected and unprepared people and businesses online. Let’s examine how the events surrounding COVID-19 have had an effect on cybercrime.

A Variety of Threats

Today, there are a lot of threats out there that could threaten a business’ data and infrastructure. This has been exacerbated by the fear brought on by the COVID-19 pandemic and most businesses don’t know where to start setting up their defenses. Most of the threats are in line with threats that they normally deal with, but many are seeing an increased frequency of them. By using COVID-19 as a ruse, cybercriminals threaten to take advantage of people's empathy. Some of the threats that business see:

  • Phishing attacks 
  • Distributed denial of service attacks
  • Man-in-the-Middle attacks
  • Network based user threats due to negligence or sabotage

Of course, any of these threats can undermine your business’ ability to function properly, let’s look at the latest scams businesses are actually dealing with:

Website Spoofing

People shouldn’t have to deal with these types of things during a public emergency, but scammers have been setting up spoofed websites to take advantage of people’s tendency to think it is less risky shopping online. From fake government websites to websites that claim to make available discount face masks or hand sanitizers (a couple of the new staples from the pandemic) are being set up to steal people’s personal information. Using this information, the more sophisticated hackers can gain access to people’s accounts, leaving individuals, and the businesses they work for, reeling. Here are a couple things you can do to keep from being a victim of false websites:

  • Check the URL - A fake site might look just like the real thing, but the URL won’t. With a lot of these scams being run on government and banking websites, you will want to remain diligent to check the URL by running your mouse over any links or buttons on a page or webform. If you can’t see where the information is going, or if the address you find is suspicious, don’t send any of your personal information through the website. 
  • Use Ad Blockers - Another great way to skim out fraudulent shady information is to utilize ad blocking software available through your browser’s store.

Email and Text Phishing

Of course, phishing is a big deal all the time as encryption does a good job of keeping traditional hackers out of their networks. Of course, phishing tactics change all the time, and since impersonating someone to gain access to personal information is one of the oldest and successful schemes on the web, it continues to be innovated upon. With over three billion phishing emails sent each day, unless you and your staff know how to spot and mitigate these threats, your organization will fall victim to one eventually. Here are a few strategies you can use to mitigate the risk from phishing emails:

  • Confirm the Sender - The only way phishing emails work is when the person receiving the message trusts the information they are being sent. Ensuring that the message you’ve received is from who it says that it is from is one of the first steps in thwarting any phishing attempt.
  • Don’t Click on Links and Attachments - Even a well-trained eye can be fooled by some link that looks legitimate but isn’t. It is important that if you aren’t expecting an email, or if you don’t personally know the person or organization that’s sending you messages (and their motives), don’t click on anything. 

Cybercrime will be here a lot longer than COVID-19 will be. It’s important that you take the steps necessary to protect your business (and yourself) from the threats presented by scammers online. For more information on how to stop COVID-19-based cyberthreats, or if you would just like to improve your business’ ability to train your staff on the importance of cybersecurity best practices, reach out to Alchetec today at 312-253-4321.

Tip of the Week: Make Email Simpler
The Pandmeic Era Internet
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, June 01 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing Cloud Data Backup Network Security Data IT Services Privacy Hosted Solutions IT Support Software Malware Hackers Internet Email Efficiency Outsourced IT Microsoft Innovation Data Recovery Computer Business Business Continuity Hardware Cloud Computing Small Business Productivity Managed IT Services Managed IT Services Mobile Devices Cybersecurity Google Ransomware User Tips Backup Collaboration Upgrade Tech Term Phishing Communication Business Management Windows 10 Workplace Tips VoIP IT Support Android Paperless Office Disaster Recovery Smartphones Mobile Device Remote Monitoring Office 365 Data Management Managed Service Provider Managed Service Managed IT Smartphone Server Communications Internet of Things Quick Tips Network Browser Save Money Social Media Facebook Encryption Passwords BDR Virtualization Help Desk Holiday Artificial Intelligence Miscellaneous Saving Money Wi-Fi Compliance Healthcare Health Government Windows 7 Document Management Windows 10 BYOD Business Technology Automation Password Microsoft Office Remote Work Vendor Management Risk Management Laptops Windows Training Applications Employer-Employee Relationship Tip of the week Apps Avoiding Downtime Mobility Recovery Going Green Maintenance Antivirus Users Redundancy Processor Vulnerability IT Management Scam Analytics Project Management Office Infrastructure Chrome SaaS Two-factor Authentication Blockchain Data loss Information Storage Telephone Systems Data Security Bandwidth Unified Threat Management File Sharing Company Culture Software as a Service Gadgets Files Customer Relationship Management Money Big Data Data Storage Website Word Proactive Regulations Politics Meetings OneDrive Router Flexibility RMM Machine Learning Wireless Virtual Reality IT Service Mobile Device Management VPN Work/Life Balance Bring Your Own Device Hosted Solution Computers Robot Access Control Firewall IoT Virtual Private Network Computing Tablet Gmail App How To Monitoring Recycling Apple The Internet of Things How To Electronic Health Records Monitors Samsung Uninterrupted Power Supply Assessment Utility Computing Dark Web Consulting Search Patch Management Time Management Social Network Consultation Chromebook Unified Communications Managed Services Provider Twitter Employees Customer Service Settings File Management Mobile Office Management Smart Technology Employee-Employer Relationship Network Management Social Solid State Drive Remote Monitoring and Management Net Neutrality Professional Services Server Management Payment Cards Remote Computing HIPAA Printing Downtime Electronic Medical Records Remote Workers Internet Exlporer Hard Drive Digital Payment Co-Managed IT Operating System Outlook Networking Identity Theft Upgrades Managed Services Cooperation Licensing Covid-19 Mobile Security Augmented Reality Display Alert Technology Laws Vendor Safety Staff Software Tips Authentication Mail Merge Database Management IBM IT Assessment Gadget Break Fix Nanotechnology WiFi VoIP ROI Dark Data Batteries Hacker Hotspot Favorites Teamwork Social Engineering Shortcut Solid State Drives Virtual Machines Virus Black Friday Motherboard Asset Tracking Theft Mobile Data Techology Database Bluetooth Downloads Cyber security Migration Development Cybercrime MSP Permission Lenovo Projects Budget Gamification Fraud Notes Heating/Cooling Unified Threat Management Smart Devices Black Market Operations Managing Stress Authorization Address GDPR Digitize Screen Reader GPS YouTube Language eWaste Google Maps Conferencing Shared resources Technology Tips Options Computer Repair Credit Cards Crowdsourcing Cyber Monday Mobile Computing Information Technology OneNote Financial Disaster Resistance Supercomputer Cyberattacks Voice over Internet Protocol Multi-Factor Security Notifications Chatbots Cables Travel Test Superfish Return on Investment Outsource IT Botnet PowerPoint Network Congestion Servers User Error Physical Security Sensors Wearable Technology Enterprise Content Management Content Filtering History Sports Shadow IT Data Warehousing Smart Tech Tracking Business Growth Computing Infrastructure Mouse Wireless Internet Holidays Corporate Profile Procurement Humor Proactive IT Cost Management IT Budget Read Only End of Support Hacking Google Calendar Windows Server 2008 Identity Cortana Active Directory Laptop Digital Point of Sale Education Printer Vulnerabilities G Suite Cabling Wires Zero-Day Threat Spam Outsourcing Telephony Microsoft Excel Connectivity Value of Managed Services Automobile Alerts Enterprise Resource Planning Instant Messaging Manufacturing Comparison Employer/Employee Relationships IT Distributed Denial of Service Modem Computer Care WannaCry Security Cameras Office Tips Touchscreen IT Consulting Transportation Trending Legislation Taxes Hard Disk Drive WPA3 Windows Server Emoji Remote Working Spyware E-Commerce Virtual Assistant Websites IT Solutions Telephone Processors IT Technicians Geography Backup and Disaster Recovery Bitcoin Video Conferencing Data Breach USB Mobile Finance Hard Disk Drives Specifications Proactive Maintenance Legal Business Telephone Law Enforcement Managed IT Service Cookies Remote Worker Private Cloud Cache Bookmarks Personal Information Optimization Social Networking Fleet Tracking Tech Terms Unsupported Software Google Drive User Management Features Wasting Time Statistics SharePoint Wireless Technology Mobile VoIP 5G Mirgation High-Speed Internet Disaster Human Error 3D Printing Firefox Current Events Update Tech Support Biometric Permissions Star Wars Mobile Device Managment Marketing Error Administrator Competition Hard Drives IP Address Public Cloud Cleaning Domains Hacks Motion Sickness Printers Public Speaking Relocation Presentation Hiring/Firing Emergency Lithium-ion battery Sync Staffing Fun Students IT Consultant CrashOverride Regulation