Blog
home
  • Register

Data Net Blog

Hackers are Using COVID-19 As an Opportunity

Hackers are Using COVID-19 As an Opportunity

In true form, cyberattacks have trended upward during the COVID-19 pandemic. With so many people working from home, it’s not much of a surprise that some of the most popular hacking tactics are being used, using the worldwide pandemic as bait. Today, we identify some of these threats.

Businesses Relying on Unsecured Remote Desktops

We briefly touched on this in the opening, but there are more unsecured remote desktops being utilized to access potentially sensitive information than at any point in history. More people are working remotely, yes, but some businesses haven’t taken into account the security of these connections and it has resulted in a 40 percent rise in unsecured remote desktops. For businesses that are utilizing them, this has to be a major concern, as it gives cybercriminals an in. By using brute force methods, they can gain access to the remote desktop and if that is a part of a larger computing network (many are), they will gain access to that as well.  

...and Brute Force is En Vogue

The cybersecurity experts at Kaspersky have seen a 400 percent increase in brute force attacks in 2020. With so many additional opportunities to breach business networks, it really isn’t a surprise. This is mainly due to IT admins having to roll out remote computing resources with no prior notice in March.

One Virus Breeds Others

Also newsworthy is the uptick of phishing attacks that are using the COVID-19 pandemic as bait. Since people are very aware of COVID-19, hackers are using psychological warfare against people concerning the topic. 

Hackers Are Succeeding

Phishing emails using COVID-19 are succeeding at an enhanced rate due to the fear surrounding COVID-19. With more people than ever engaged about an issue, people who are untrained on how to thwart phishing attacks can be pretty low-hanging fruit for hackers. 

COVID-19 is a Field Day for Scammers

The global pandemic has fueled a whole hacking ecosystem. Billions of COVID-19 pages are up on the Internet—and more are added every day—so it is hard for people to know which are legitimate and which are nefarious. What’s worse is that 90 percent of all COVID-19 pages added to the web are scams. 

Security has to be a priority for every user, but when you are responsible for your company’s network and infrastructure health, it is imperative that you know what kinds of threats are being pushed at any given time. To talk to one of our IT experts about what you can do, call us today at (760) 466-1200.

Tip of the Week: Seeing the Value of Google Lens
Speed Up Your Email Communications with Gmail Temp...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, October 23, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.4datanet.com/

Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Network Security Data Efficiency Privacy Communication IT Support Malware Hackers Google Hardware Smartphones User Tips Workplace Tips Email Innovation Cloud Small Business Users Microsoft VoIp Software Communications Mobile Device Managed IT Services Cybersecurity Computer Business Collaboration Internet Tech Term Mobile Devices Hosted Solutions Business Management Android Ransomware Miscellaneous Outsourced IT Cloud Computing Network Social Media Windows 10 Phishing Passwords IT Services Backup Covid-19 Browser Managed Service Upgrade Information Smartphone Saving Money Apps Data Backup Data recovery Wi-Fi Windows Facebook Networking Applications Wireless Microsoft Office Bandwidth Holiday Gadgets Internet of Things Patch Management Automation Employer-Employee Relationship Gmail Compliance Access Control Marketing Chrome Remote Work Data Breach Apple VPN BDR Managed IT services Blockchain Quick Tips Office 365 Health Voice over Internet Protocol Save Money Going Green Remote Laptop Mobile Office Conferencing Analytics Router Word Value Employee-Employer Relationship Business Intelligence Managed IT Service Retail Tech Terms Cost Management Virtualization Business Continuity Telephone System Connectivity Computers Content Filtering Payment Cards Physical Security Company Culture Disaster Recovery Server Data Protection Social Network Twitter Settings Telephony Excel Artificial Intelligence Cybercrime Healthcare Password Processor Net Neutrality Scam Business Technology G Suite Data Security Paperless Office Mobility Battery Cortana iPhone Bring Your Own Device Remote Monitoring and Management Batteries RAM Education Training Government Remote Computing Remote Monitoring Data Management Wireless Charging Medical IT Windows 7 Office Virtual Assistant Virus How To Mobile Device Management Live Streaming Firewall Safety Security Cameras Risk Management Law Enforcement Telecommuting A.I. Meetings Electronic Health Records Vendor User Tip Spyware Management SaaS Time Management Insurance Sales Online Shopping Tech Support Co-Managed IT WiFi Cables Profitability Data loss Holidays Paper Recovery Big Data Technology Tips Payment Tip of the Week/Security Database Customer Service Profiles Edge Wearables Remote Support Movies Printer Touchscreen Network Attached Storage Environment Spam Updates Cleaning Remote Working GDPR IT budget Chrome OS File Management Tablet Alert Humor Vulnerability Eliminating Downtime HP OneNote WannaCry Ink Virtual Reality instant Messaging Threats User Security Managing Stress Comparison Maintenance Shadow IT Plug-In Dongle Workers Encryption Microsoft Office 365 e-waste Employees Distribution BYOD Document Management Antivirus Certification Tip of the week Streaming Media Storage Inventory Current Events Memes Windows Server 2008 R2 HIPAA PowerPoint Backup and Disaster Recovery Vulnerabilities Scams Voice over IP Virtual Private Network Troubleshooting Machine Learning Tactics Specifications Congratulations Internet Explorer Computer Repair Proactive IT Recycling File Sharing Millennials Unified Communications Innovations Authentication disposal Solid State Drive Fleet Management IT Wireless Internet Staff Display Botnet Downloads PCI DSS Dark Web IT Management Mobile Security Human Resources Knowledge Travel Taskbar Hard Drive Sports Remote Workers Reporting Hard Drives Cryptocurrency Project Management Customer Relationship Management Update Lead Generation WhatsApp Threat IT Service Personal Information Website Information Technology Authorization Server Management Hard Disk Drive Multi-Factor Authentication Hosted Desktop Amazon Digital Websites Benchmarks Trends Regulations Compliance Error Operating System Managed Services Provider Help Desk National Security Processors News SSD Search eCommerce Licensing Managed Service Provider Hybrid Cloud Outlook Telecommute Printing Mobile E-Commerce Bitcoin Microsoft Teams YouTube Video Financial Printers Thank You Regulation Analysis

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123