(415) 246-0101
In true form, cyberattacks have trended upward during the COVID-19 pandemic. With so many people working from home, it’s not much of a surprise that some of the most popular hacking tactics are being used, using the worldwide pandemic as bait. Today, we identify some of these threats.
We briefly touched on this in the opening, but there are more unsecured remote desktops being utilized to access potentially sensitive information than at any point in history. More people are working remotely, yes, but some businesses haven’t taken into account the security of these connections and it has resulted in a 40 percent rise in unsecured remote desktops. For businesses that are utilizing them, this has to be a major concern, as it gives cybercriminals an in. By using brute force methods, they can gain access to the remote desktop and if that is a part of a larger computing network (many are), they will gain access to that as well.
The cybersecurity experts at Kaspersky have seen a 400 percent increase in brute force attacks in 2020. With so many additional opportunities to breach business networks, it really isn’t a surprise. This is mainly due to IT admins having to roll out remote computing resources with no prior notice in March.
Also newsworthy is the uptick of phishing attacks that are using the COVID-19 pandemic as bait. Since people are very aware of COVID-19, hackers are using psychological warfare against people concerning the topic.
Phishing emails using COVID-19 are succeeding at an enhanced rate due to the fear surrounding COVID-19. With more people than ever engaged about an issue, people who are untrained on how to thwart phishing attacks can be pretty low-hanging fruit for hackers.
The global pandemic has fueled a whole hacking ecosystem. Billions of COVID-19 pages are up on the Internet—and more are added every day—so it is hard for people to know which are legitimate and which are nefarious. What’s worse is that 90 percent of all COVID-19 pages added to the web are scams.
Security has to be a priority for every user, but when you are responsible for your company’s network and infrastructure health, it is imperative that you know what kinds of threats are being pushed at any given time. To talk to one of our IT experts about what you can do, call us today at (415) 246-0101.
About the author
When he is not helping businesses with their IT needs, Daniel is in the computer lab. Testing new tech solutions that can be added to the tool belt. If you ever have any tech or business question, Daniel is ready to help you find the answer.
Mobile? Grab this Article!
Tag Cloud
Comments