• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • About Us
  • Contact Us
  • Block Examples
  • Landing Page

iHash

News and How to's

  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

How to Defend Against Malware, Phishing, and Scams During COVID-19 Crisis

Dec 23, 2020 by iHash Leave a Comment

As if the exponential rise in phishing scams and malware attacks in the last five years wasn’t enough, the COVID-19 crisis has worsened it further.

The current scenario has given a viable opportunity to cybercriminals to find a way to target individuals, small and large enterprises, government corporations.

According to Interpol’s COVID-19 Cybercrime Analysis Report, based on the feedback of 194 countries, phishing/scam/fraud, malware/ransomware, malicious domains, and fake news have emerged as the biggest digital threats across the world in the wake of the pandemic.

Image source: interpol.int

There are primarily two reasons for emerging cyber threats in 2020:

  • Most of the population is working, learning, shopping, or running their business from home, where they’re using personal devices from the home/public internet connection, which are usually unsafe and hence highly vulnerable to cybercrimes.
  • The cybercriminals are using the COVID-19 theme to exploit people and enterprises through malicious e-mails and domains. For example, many scammers have rolled out campaigns offering COVID-19 vaccines, free medical tests and testing kits, tax rebates for donation to pandemic relief funds, information on COVID-19 cases, and new job opportunities due to the economic downturn. Some have even launched fake e-commerce websites selling COVID-19 safety, health, and sanitization products.

Let’s take a look at a few examples of cyber threats and security breaches that have taken place in 2020.

Scams

  • In April 2020, swindlers impersonated the World Health Organization (WHO) to send e-mails to the public seeking donations to a fictitious COVID-19 fund.
  • In March 2020, the Department of Justice in the United States filed a legal appeal in the federal court to shut down a website called coronavirusmedicalkit[.]com, which claimed to sell free vaccine kits.

Phishing

  • A phishingscam campaign sent out fake Zoom invites to employees from HR. The idea was to phish out their passwords.
  • Several UK citizens received an e-mail from a fake government ID telling them to claim a tax refund to protect against the COVID-19 crisis.

Malware

  • The Powershell malware attacks in 2020 have witnessed a sharp increase of 117% in North America.
  • Ryuk has emerged as one of the biggest malware threats to US hospitals and healthcare providers in 2020.

Ways to Safeguard Against COVID-19 Digital Threats

Cyber risk management calls for both preventive and detective measures listed below:

1 — Educate Your Staff

Most phishing e-mails appear so legitimate that your employees are likely to open the attachment or embedded link without verifying the sender’s e-mail id or the information in the message’s body.

Create cybersecurity awareness among your employees to help them identify unauthenticated e-mails. Tell them to double-check the sender’s e-mail address and look for grammatical errors or unusual requests. If they suspect anything, they should immediately get in touch with the IT team instead of forwarding the e-mail to co-workers.

2 — Encrypt and Backup Data

You must use full-disk encryption software to encrypt all sensitive data of your company, customers, and employees.

It is also always a good idea to take a system backup of your databases, files, and databases at regular intervals.

The general rule of backup is 3-2-1: create at least three copies, two of which should be on different mediums (devices/cloud), and one copy should be off-site for disaster recovery.

3 — Fortify Cybersecurity Policy for Remote Working

It is crucial to create a strict rulebook for your employees, laying down the protocol for using home computing devices and internet connection. They should use a secure internet connection, avoid the use of office devices for personal use, and store official files/information only on company storage systems.

Also, make sure that your company implements robust firewall rules and multi-layer authentication for VPN, critical business systems, and any other remote network connections. Let your employees know the company-approved applications and collaboration tools they have to use.

4 — Use Anti-Virus Solutions

This may sound like basic security protocol, but it is extremely important to install sophisticated and trustworthy anti-virus software on your company servers and devices.

5 — Secure Your Web and Mobile Applications

With COVID-19 pushing the world to embrace digital on every front, your web and mobile applications are more at risk from cyber threats and security violations. Hence, you must proactively monitor application security risks and take preventive measures to mitigate them.

You can do so by implementing AppTrana, a risk-based, fully managed application security solution offered by Indusface. AppTrana provides real-time protection against OWASP exploits, DDOS attacks, Bot Mitigation, and Zero-Day attacks.

You can also consider Indusface WAS, which is a comprehensive web application vulnerability detection solution. It provides Automated DAST Scanner combined with on-demand Manual Penetration Testing and false-positive removal via manual verification.

If you are looking for mobile security solutions, then Indusface MAS runs in-depth Pen-testing with multiplatform coverage, including iOS, Android, and Windows, for vulnerability detection.

Conclusion

COVID-19 has put the pressing need on organizations to re-strategize their cybersecurity policy to keep digital threats at bay.

It is also essential to understand that cyber threats are here to stay even after the ongoing pandemic because global digital usage is expected to increase continuously in the coming years.

Hence, it would help if you get prepared on all fronts to combat the cyber-attacks effectively.

Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: computer security, COVID19, Crisis, cyber attacks, cyber news, cyber security news, cyber security news today, cyber security updates, cyber updates, data breach, Defend, hacker news, hacking news, how to hack, information security, Malware, network security, Phishing, ransomware malware, scams, software vulnerability, the hacker news

Special Offers

  • Luminox Black OPS Carbon Quartz Men's Watch XL.8802.F (Store-Display Model) for $199

    Luminox Black OPS Carbon Quartz Men's Watch XL.8802.F (Store-Display Model) for $199
  • Swarovski Vintage Swan Gold Tone Dark Multi-Colored Crystal Necklace (Store-Display Model) for $52

    Swarovski Vintage Swan Gold Tone Dark Multi-Colored Crystal Necklace (Store-Display Model) for $52
  • Accordina Ambient LED Collapsible Wireless Phone Charger for $29

    Accordina Ambient LED Collapsible Wireless Phone Charger for $29
  • Swarovski "Bee A Queen" Rhodium-Plated Crystal Necklace & Earring Set (Store-Display Model) for $84

    Swarovski "Bee A Queen" Rhodium-Plated Crystal Necklace & Earring Set (Store-Display Model) for $84
  • Swarovski New Love Gold Tone Dark Multi-Colored Crystal Necklace (Store-Display Model) for $65

    Swarovski New Love Gold Tone Dark Multi-Colored Crystal Necklace (Store-Display Model) for $65

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

E-mail Newsletter

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

Swarovski Vintage Swan Gold Tone Dark Multi-Colored Crystal Necklace (Store-Display Model) for $52

Apr 15, 2021 By iHash

Accordina Ambient LED Collapsible Wireless Phone Charger for $29

Apr 14, 2021 By iHash

Tags

* Apple computer security cyber attacks cyber crime cyber news cybersecurity Cyber Security cyber security news cyber security news today cyber security updates cyber threats cyber updates data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS iOS 7 iOS 8 iPad iPhone iPhone 6 Malware microsoft network security OS X Yosemite Privacy ransomware malware risk management security security breaches security vulnerabilities software vulnerability the hacker news update video web applications
Copyright iHash.eu © 2021
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.