Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Cybercrime Spiking During the Pandemic

Cybercrime Spiking During the Pandemic

Keeping your network and infrastructure free from threats is always a priority, but with so many people working remotely businesses have encountered problems doing so. In fact, hackers, known for their opportunism, have been ultra-opportunistic during this period and it is causing many headaches for network administrators. Let’s take a look at some statistics that are definitely concerning as we head into the fall, where many experts expect the virus to become more problematic. 

Unsecured Remote Desktops at an All-Time High

With so many workers being asked to work remotely, and no time to plan out a strategy to get them secured, many employees are working with unsecured access to company resources. In fact, unsecured remote desktops have risen by over 40 percent. This is a major concern, because cybercriminals can use brute force methods to gain access to a desktop. If that desktop is part of a larger computing network, they gain access to that as well. Not a good situation. 

Speaking of Brute Force Attacks...

With so many unsecured connections out there, brute force attacks are up nearly 400 percent over numbers in 2019. Kaspersky published a report stating as such, and it really isn’t a surprise. IT admins were given no advanced notice that they were to implement all the services employees would need, creating a lot of potential problems. 

COVID-19 Isn’t Just One Virus

Another revelation that has been made is the fact that hackers and scammers are using COVID-19, and people’s hyper awareness of it, against users. This was seen almost immediately as COVID-19-related phishing attacks exploded all around the Internet. In fact, in one month, there were nearly 70 times more COVID-19-related phishing attacks than the previous month. 

These Attacks Are Hitting the Mark

Unfortunately, because people are working remotely and are less likely to scrutinize incoming emails, many of these phishing emails resulted in networks being breached by outside threats. People were the weakest link in your company’s cybersecurity platform before, but without the constant reminders to be vigilant with emails, users are being less careful and it is resulting in issues across the board. 

COVID-19 is a Field Day for Scammers

As mentioned earlier and understood by many security-minded people out there, hackers are opportunists. A global pandemic is just the kind of situation that hackers look to take advantage of; and they have. There are literally billions of COVID-19 pages up on the Internet, so ascertaining which are legitimate and which are nefarious is going to be difficult. Additionally, thousands of domains are added each day, of which 90 percent are scams. Not a good look for humanity when the largest health crisis in decades is met with people trying to steal money and data from others. 

Zooming Right Into Trouble

Remote working means conferencing, and Zoom is one of the biggest beneficiaries of this whole mess. Unfortunately for its users, it can be a risk to use such a useful software. In April it was reported that over 500,000 Zoom credentials were available for purchase on the Dark Web. Additionally, there is a lot of interest in the word “zoom” online, which tells experts that there will be an increase in malicious code being shared with zoom in the name. Experts believe this increase could be up to 200 times more than the norm. Zoom isn’t dangerous to use on its own, it’s just the fact that people aren’t being careful or practicing good cybersecurity hygiene when using the platform.

Other Problems

On top of the spike in COVID-19-related phishing attacks, the brute force attacks, and the Zoom credentials available on the Dark Web, there have been reports of fake contact tracing apps that contain ransomware. Contact tracing is the act of trying to isolate where COVID-19 cases come from to try and eliminate the spread of it. Unfortunately, these apps are now being used to distribute ransomware. Difficult times we’re living in.

Security has to be top of mind no matter what your business is dealing with. If you would like to discuss what you can do to ward off COVID-19-related cyberthreats, call the knowledgeable experts at Central Technology Solutions today at 1-844-237-4300.

Useful Gadgets for the Remote Worker
A Security Briefing on Chrome Extensions
 

By accepting you will be accessing a service provided by a third-party external to https://www.centraltechnologysolutions.com/

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Data Network Security Privacy Hosted Solutions IT Services Email Internet Data Backup Malware Hackers IT Support Software Efficiency Business Outsourced IT Innovation Microsoft Hardware Data Recovery Mobile Devices Productivity Computer Google Managed IT Services Upgrade Business Continuity Smartphone Small Business Phishing IT Support Collaboration Cloud Computing Cybersecurity Backup User Tips Mobile Device Disaster Recovery Ransomware Communication Business Management Workplace Tips Tech Term Managed Service Provider VoIP Managed IT Services Windows 10 Smartphones Android Quick Tips Managed Service Internet of Things Paperless Office Data Management Social Media communications Network Browser Covid-19 Remote Monitoring Encryption Facebook Managed IT Saving Money Save Money Office 365 Windows 10 Windows Artificial Intelligence Server BDR Remote Work Help Desk Business Technology Miscellaneous Users Virtualization Risk Management Wi-Fi Apps Compliance Passwords Holiday Document Management BYOD Chrome Vendor Management Password Analytics Mobile Device Management Healthcare Health Windows 7 Government Office App Microsoft Office Automation Training Avoiding Downtime Data Security Applications Robot Gmail Content Filtering Firewall Unified Threat Management Laptops Big Data Recovery Employer-Employee Relationship Money Blockchain Bring Your Own Device Bandwidth Going Green Hosted Solution Data loss Vulnerability Mobility Information Technology Website File Sharing Wireless Files SaaS Telephone Systems Processor Two-factor Authentication Regulations IT Management Redundancy Apple Gadgets Computers Tip of the week Scam Storage Project Management Antivirus Information Computing Data storage Mobile Office Infrastructure Virtual Private Network Budget Machine Learning Company Culture Customer Service Printing RMM Operating System Virtual Reality Tablet Meetings Remote Computing Proactive Software as a Service Settings OneDrive Employee-Employer Relationship Router Maintenance IT Service Politics Social Work/Life Balance Hard Drive Unified Communications VPN IoT WiFi Access Control Customer Relationship Management Downtime Flexibility Employees Data Breach Social Network Monitoring Bitcoin Administration Network Management Education Recycling Assessment File Management LiFi Outlook How To Upgrades Mouse Server Management Utility Computing Consulting Data Storage IT solutions Instant Messaging Augmented Reality Twitter Payment Cards Dark Web Consultation Google Drive Uninterrupted Power Supply The Internet of Things Display Co-Managed IT Managed Services Provider End of Support Sports Private Cloud Business Growth Search Tech Support Management Professional Services Managed Services Remote Monitoring and Management Smart Technology Word Net Neutrality Monitors Mobile Computing Electronic Medical Records Remote Digital Payment Hacker Alert Remote Workers Websites Identity Theft Solid State Drive Internet Exlporer Current Events Remote Worker Licensing Wireless Technology Legal Spam HIPAA How To Samsung Patch Management Cooperation Time Management Networking YouTube Electronic Health Records Mobile Security Chromebook Reviews Hacks Return on Investment Automobile Computer Care High-Speed Internet Legislation IT Technicians Typing Notifications Servers Teamwork Gadget Star Wars Permissions Nanotechnology PCI DSS Database Management Shadow IT SharePoint Conferencing Staff Best Practice Black Market Database Sensors Asset Tracking Break Fix Social Networking Holidays GPS Unified Threat Management Cyberattacks Hotspot Writing Emoji Notes MSP Black Friday Roanoke — Central Technology Solutions Outsource IT Disaster Trending Options Network Congestion Mail Merge Active Directory Development Zero-Day Threat Mirgation Technology Laws Shared resources Windows Server 2008 Virtual Desktop Fraud Screen Reader Computer Repair Windows 8 Save Time VoIP Sponsor GDPR Outsourcing Supercomputer Managing Stress Downloads Touchscreen Techology Voice over Internet Protocol Crowdsourcing OneNote Motherboard 5G IT Tracking eWaste User Error Read Only Language Retail Cortana Lenovo PowerPoint Value of Managed Services G Suite History Cyber Monday Tech Terms technology services provider Physical Security Laptop Identities Smart Tech Address Windows Server Google Maps Cables Backup and Disaster Recovery Migration 3D Printing Statistics Taxes CRM Digital Obstacle Video Conferencing IT Budget Enterprise Content Management Finance Operations Processors Google Wallet Disaster Resistance Telephone Data Warehousing Wireless Internet Business Telephone Marketing Computing Infrastructure Superfish Cabling Theft Technology Assurance Group ’s 18 Office Tips Remote Working Hard Drives Google Docs E-Commerce Update Humor Security Cameras User Management Buisness Wires Technology Tips Human Error Chatbots Unsupported Software Virus Bluetooth Manufacturing Optimization Cost Management Backups Spyware Course Biometric Vulnerabilities Multi-Factor Security Authentication Wearable Technology Drones Proactive IT Transportation Mobile VoIP Point of Sale Connectivity Microsoft Excel Modem Shortcut Employer/Employee Relationships IT Assessment Enterprise Resource Planning Printer Bookmarks Alerts Social Engineering Deep Learning USB Virtual Assistant Vendor Cybercrime WPA3 Distributed Denial of Service Financial Annual Convention Features Firefox Batteries Sync Comparison Permission Identity Mobile Data Hard Disk Drives Virtual Machines Telephony Banking Projects Gamification Public Cloud Geography Google Calendar Authorization Alt Codes Heating/Cooling IT Consulting Cyber security Law Enforcement Cookies WannaCry Proactive Maintenance Digitize Botnet Mobile Favorites Safety Wasting Time Smart Devices Travel Fleet Tracking Managed IT Service Procurement San Diego Dark Data Personal Information Peripheral Cryptocurrency Cache ROI Mobile Device Managment Software Tips Specifications Test Hacking Solid State Drives Credit Cards CrashOverride Cameras Motion Sickness Administrator CCTV Relocation Webcam Printers IT Consultant Error Hard Disk Drive Students Web Server Emergency Regulation