Search

Covid19 and its impact on cybercrimes

With the pandemic, a lot of business has to adopt work from a home model and accelerate their digital transformation. Whether they were ready or not, but transformations had to be planned overnight. In the situation of COVID 19 readiness urgency the operational, legal, compliance, and cybersecurity problems were overlooked. This article talks about such issues and steps an organization can take to provide cyber-safe work from anywhere environment.



There is a surge of cybercrime complaints since the time COVID 19 has hit the world. Criminals are taking advantage of the situation and are targeting corporates in the hopes of getting good money from such extortions. A lot of fake websites have also popped up where people are selling unauthorized COVID 19 related relief materials. Phishing attacks are also at an all-time high.




Cyber Attack landscape in Covid 19:

1. Email and Phishing Attacks were the most common types of attacks that impacted a user’s computer while working from home. In April, Google blocked 18 million daily malware and phishing emails related to Coronavirus. (Google)








2. 471 fake online shops selling fraudulent COVID-19 items were taken down in the UK. (ZDNet)













3. 33,000 unemployed applicants were exposed to a data security breach from the Pandemic Unemployment Assistance program in May. (NBC)










4. 450 active WHO email addresses and thousands of COVID-19 response team’s email addresses were leaked in April. (WHO)











5. Visits to popular hacker websites and forums increased by 66% between March and May. (Cybernews)











6. In 2020, worldwide government IT spending is forecasted to reach $438 billion. (Gartner)











7. On average customers’ personally identifiable information (PII) was the most commonly compromised kind of record and the most expensive one as per the data breaches studies. (IBM)











What you can do to safeguard your organization and employee’s data from breaches:

1. Report suspicious emails to your IT security team

2. Do not open or click on attachments from unknown senders

3. Carefully note grammatical and spelling mistakes in the domain names or web addresses

4. Use your organization’s IT team’s authorized antivirus or antispyware on your machine

5. Install corporate anti-phishing filters on emails and browsers

6. Do not forward suspicious emails to your co-workers

7. Update your passwords frequently

8. Set up web security

9. Take a backup of your data frequently

10. Hover over the links to see if it is a genuine website

11. Display name needs to match or be relevant with the username and domain of the email sender for example Elon Musk: hacker@phishing.com; the genuine one would come from elon@tesla.com


Have more questions?

If you like this article and would like to read more of our content for cybersecurity insights, tips and tricks feel free to follow us on Oppos social media. If you’re a struggling business owner who needs help in assessing their business’s cybersecurity posture feel free to take advantage of our free introductory assessment and we’ll help you figure out a game plan for keeping your company safe.



25 views